<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes, of course. Sorry mate. I in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947473#M144707</link>
    <description>&lt;P&gt;Yes, of course. Sorry mate. I've been running constantly 3 days for approx 10h per day, so I missed one small thing which is quite logical, and that is object name. When I set object, and set new IP it only overwrote the the current object. Naming it differently it is creating new separate entity.... Of course.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What about assigning 1 WAN on physical interface. Will this affect somehow NAT rule that you set or I need to remove IP address from interface and set each IP as object and manipulate traffic with them? Can I use "IP assigned" WAN interface and get traffic for other WANs as well? Will router/firewall accept the packets even though on WAN interface is xxx.xxx.xxx.xxx, but traffic is sent for xxx.xxx.xxx.xxy?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Since I have never before set multiple WAN on same interface, what is happening in the background? ISP sends traffic for subnet xxx.xxx.xxx.xxx/29, two addresses are for network and broadcast, one is ISP gateway, and you have 5 left to use. Usually if there is /30, it would be 1:1 communication (ISP GW to your router/firewall) which is quite clear to me, but what is happening with 5 WANs? As I can see from command that you've set,&amp;nbsp;"virtually assigned" as network objects, and NAT-ed to specific network or machine static 1:1, correct? Does this mean that traffic from ISP is sent via GW to firewall for all 5 WANs, and in the header of the packet, there is IP which declares which WAN it is? When firewall/router gets the packet, it&amp;nbsp;interprets and forwards per rule that you've set or?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I assume that port forwarding is the same thing, you use interface which is assigned with IP address or?&lt;/P&gt;</description>
    <pubDate>Thu, 24 Nov 2016 12:25:42 GMT</pubDate>
    <dc:creator>Rawit2015</dc:creator>
    <dc:date>2016-11-24T12:25:42Z</dc:date>
    <item>
      <title>Multiple WAN on same interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947469#M144680</link>
      <description>&lt;P&gt;Since I have never worked with ASA having a multiple WAN on same interface, how this can be achieved? My ISP has given me /29 IP address, and I assigned xxx.xxx.xxx.xxx/29 to one physical interface, set gw, route for gw, nat, access lists, etc. My question is, how can I use other WAN addresses from same scope and make forward each one of them for each internal subnet. For example: xxx.xxx.xxx.xxx/29 to 192.168.1.0/24, xxx.xxx.xxx.xxy/29 to 172.16.1.0/23, xxx.xxx.xxx.xxz/29 to 10.0.0.0/24...&lt;/P&gt;
&lt;P&gt;Can someone provide an example?&lt;/P&gt;
&lt;P&gt;Also how can this be achieved if each WAN is assigned with physical interface on ASA (if it is possible)?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947469#M144680</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2019-03-12T08:34:36Z</dc:date>
    </item>
    <item>
      <title>Hello, </title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947470#M144689</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can be achived by configuring NAT rules.&lt;/P&gt;
&lt;P&gt;For example,&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network host_01&lt;BR /&gt;&amp;nbsp;host 192.168.1.100&lt;BR /&gt;&amp;nbsp;nat (inside_01, outside) static&amp;nbsp;&lt;SPAN&gt;xxx.xxx.xxx.xxx&lt;BR /&gt;&lt;/SPAN&gt;object network host_02&lt;BR /&gt;&amp;nbsp;host 172.16.1.100&lt;BR /&gt;&amp;nbsp;nat (inside_02, outside) static&amp;nbsp;&lt;SPAN&gt;xxx.xxx.xxx.xxy&lt;BR /&gt;&lt;/SPAN&gt;object network host_03&lt;BR /&gt;&amp;nbsp;host&amp;nbsp;10.0.0.100&lt;BR /&gt;&amp;nbsp;nat (inside_03, outside) static&amp;nbsp;&lt;SPAN&gt;xxx.xxx.xxx.xxz&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;If you have dedicated physical interfaces for different WAN, the configuration is pretty similar:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network host_01&lt;BR /&gt;&amp;nbsp;host 192.168.1.100&lt;BR /&gt;&amp;nbsp;nat (inside_01, outside_01) static&amp;nbsp;&lt;SPAN style="background-color: #ffffff; color: #58585b; font-family: Arial, sans-serif; font-size: 16px;"&gt;xxx.xxx.xxx.xxx&lt;BR /&gt;&lt;/SPAN&gt;object network host_02&lt;BR /&gt;&amp;nbsp;host 172.16.1.100&lt;BR /&gt;&amp;nbsp;nat (inside_02, outside_02) static&amp;nbsp;&lt;SPAN&gt;yyy.yyy.yyy.yyy&lt;BR /&gt;&lt;/SPAN&gt;object network host_03&lt;BR /&gt;&amp;nbsp;host&amp;nbsp;10.0.0.100&lt;BR /&gt;&amp;nbsp;nat (inside_03, outside_03) static&amp;nbsp;&lt;SPAN&gt;zzz.zzz.zzz.zzz&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 23 Nov 2016 08:13:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947470#M144689</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-11-23T08:13:11Z</dc:date>
    </item>
    <item>
      <title>Hi Boris,</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947471#M144699</link>
      <description>&lt;P&gt;Hi Boris,&lt;/P&gt;
&lt;P&gt;I am having multiple results now. At the customers site I've got reply from ASA about overlapping and when I came into our office and try to test once again, it was successfully added... One thing I noticed, when I set command (please check the host IP): (instead of two different hosts, I tried to set 2 WANs on same IP address)&lt;/P&gt;
&lt;P&gt;I noticed that only last NAT was added xxx.xxx.xxx.xyy, but not xxx.xxx.xxx.xxx.&lt;/P&gt;
&lt;P&gt;Also I have assigned one public WAN into phisical interface, as it has to be dynamic NAT. Does this somehow affect why it didn't accept the last static NAT?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; network host_01&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;host &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;1.100&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;inside_01&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; outside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; network host_01&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;host &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;1.100&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;inside_01&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; outside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xyy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 24 Nov 2016 09:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947471#M144699</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-11-24T09:53:05Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947472#M144703</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Very easy, just create two objects with different names (host_01 and host_02) but with the same host IP:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; network &lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;host_01&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;host &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;1.100&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;nat &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;inside_01&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; outside&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; network &lt;STRONG&gt;&lt;SPAN style="font-size: 12pt;"&gt;host_02&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;host &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;1.100&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;nat &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;inside_01&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; outside&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xxx&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;xyy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 24 Nov 2016 09:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947472#M144703</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-11-24T09:58:27Z</dc:date>
    </item>
    <item>
      <title>Yes, of course. Sorry mate. I</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947473#M144707</link>
      <description>&lt;P&gt;Yes, of course. Sorry mate. I've been running constantly 3 days for approx 10h per day, so I missed one small thing which is quite logical, and that is object name. When I set object, and set new IP it only overwrote the the current object. Naming it differently it is creating new separate entity.... Of course.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What about assigning 1 WAN on physical interface. Will this affect somehow NAT rule that you set or I need to remove IP address from interface and set each IP as object and manipulate traffic with them? Can I use "IP assigned" WAN interface and get traffic for other WANs as well? Will router/firewall accept the packets even though on WAN interface is xxx.xxx.xxx.xxx, but traffic is sent for xxx.xxx.xxx.xxy?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Since I have never before set multiple WAN on same interface, what is happening in the background? ISP sends traffic for subnet xxx.xxx.xxx.xxx/29, two addresses are for network and broadcast, one is ISP gateway, and you have 5 left to use. Usually if there is /30, it would be 1:1 communication (ISP GW to your router/firewall) which is quite clear to me, but what is happening with 5 WANs? As I can see from command that you've set,&amp;nbsp;"virtually assigned" as network objects, and NAT-ed to specific network or machine static 1:1, correct? Does this mean that traffic from ISP is sent via GW to firewall for all 5 WANs, and in the header of the packet, there is IP which declares which WAN it is? When firewall/router gets the packet, it&amp;nbsp;interprets and forwards per rule that you've set or?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I assume that port forwarding is the same thing, you use interface which is assigned with IP address or?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2016 12:25:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947473#M144707</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-11-24T12:25:42Z</dc:date>
    </item>
    <item>
      <title>I'll try to answer the</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947474#M144710</link>
      <description>&lt;P&gt;I'll try to answer the questions &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;What about assigning 1 WAN on physical interface. Will this affect somehow NAT rule that you set or I need to remove IP address from interface and set each IP as object and manipulate traffic with them?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;No, you don't have to remove IP-address from interface. Moreover, you have to configure IP-address on interface to make routing work.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Can I use "IP assigned" WAN interface and get traffic for other WANs as well? Will router/firewall accept the packets even though on WAN interface is xxx.xxx.xxx.xxx, but traffic is sent for xxx.xxx.xxx.xxy?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Sure you can. The magic is&amp;nbsp;with ARP protocol. When you don't have any NAT rule configured, ASA answers only to ARP requests for IP address, assigned on the interface. When you configure NAT rule, ASA begins to answer to ARP requests for both IP addresses (assigned to interface and configured in NAT rute.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Since I have never before set multiple WAN on same interface, what is happening in the background? ISP sends traffic for subnet xxx.xxx.xxx.xxx/29, two addresses are for network and broadcast, one is ISP gateway, and you have 5 left to use. Usually if there is /30, it would be 1:1 communication (ISP GW to your router/firewall) which is quite clear to me, but what is happening with 5 WANs?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Again, magic is with ARP. ARP works fine in the background.&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;As I can see from command that you've set,&amp;nbsp;"virtually assigned" as network objects, and NAT-ed to specific network or machine static 1:1, correct? Does this mean that traffic from ISP is sent via GW to firewall for all 5 WANs, and in the header of the packet, there is IP which declares which WAN it is? When firewall/router gets the packet, it&amp;nbsp;interprets and forwards per rule that you've set or?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Absolutely correct. When ISP receives the packet from somewhere outside with destination address xxx.xxx.xxx.xyy (virtually assigned) Provider's equipment already knows the route to xxx.xxx.xxx.xyy as directy connected network (xxx.xxx.xxx.xxx/29). The only information it needs to send the packet is the MAC-address. So it makes an ARP request. ASA with NAT rule configured to virtually assigned address xxx.xxx.xxx.xyy answers the ARP request with its MAC-address. So ISP's router can now successfully send the packet with destination address xxx.xxx.xxx.xyy. When ASA receives this packet, it matches IP-addess xxx.xxx.xxx.xyy with configured NAT rute, performs the untranslation to 192.168.1.100 and send the packet further.&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;I assume that port forwarding is the same thing, you use interface which is assigned with IP address or?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Yes. correct. With port forwarding you can use IP address of WAN interface in your NAT rule (PAT rule to be precise).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2016 15:02:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947474#M144710</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-11-24T15:02:15Z</dc:date>
    </item>
    <item>
      <title>Thank you mate for clarifying</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947475#M144714</link>
      <description>&lt;P&gt;Thank you mate for clarifying things. Tomorrow I will configure ASA. The only thing what is left is ASA is somehow blocking Meraki cloud communication with switches. I noticed that Meraki is set quite long list of IPs and 4 ports for outbound traffic. By outbound, I presume they need permit rule on access list from those IPs to internal network for specific port. The only thing I am not sure if port fwd is needed, because by some logic, interface is set to be static so no IP assignment to Meraki sw, which again means you cannot point traffic as you don't know "where"... I am quite disappointed with Cisco Meraki documentation as it doesn't explain what is happening in the background. Does switches contact cloud service or (traffic should be state full inspected), and/or is the cloud service also sending traffic from the cloud towards switches which means you need to set access control rules for outside interface -&amp;gt; "in"...&lt;/P&gt;
&lt;P&gt;Ah yes, one more thing. Do you have any experience with direct link ASA - HP MSM720 controller? On controller there is port that is set as VLAN 10. On other side is interface of ASA. Previous versions of IOS/5505 would allow to create interface VLAN 10, now I see that they've changed the logic and you need to create sub-interface and then assign IP and VLAN. The confusion starts in this area. By mistake I configured physical interface with native VLAN (by definition it is considered as VLAN 1), on other side is MSM720 with VLAN10. How is possible that I could ping ASA and vice versa if controller has VLAN 10, and ASA native VLAN? Moreover when I configured sub-interface with VLAN 10, and tried to ping controller (opened Wireshark) I didn't get any traffic?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Command that I used is:&lt;/P&gt;
&lt;P&gt;#conf t&lt;/P&gt;
&lt;P&gt;#interface GigabitEthernet 1/5.10&lt;/P&gt;
&lt;P&gt;#vlan 10&lt;/P&gt;
&lt;P&gt;#ip address xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx&lt;/P&gt;
&lt;P&gt;#no shut&lt;/P&gt;
&lt;P&gt;(Also on main interface I set no shutdown)...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2016 20:35:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947475#M144714</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-11-24T20:35:29Z</dc:date>
    </item>
    <item>
      <title>Hello, Unfortunately I don't</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947476#M144721</link>
      <description>&lt;P&gt;Hello, Unfortunately I don't have any experience with Meraki, so not able to comment.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HP MSM720 - also never used. But I'll try to share my thoughts...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What does it mean "on other side is MSM720 with VLAN10"? It seems, that MSM has an access port with vlan 10. No trunk port (no 802.1q tagging).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ASA with native vlan 1 also does not perform any 802.1q tagging. So from VLAN perspective it absolutely does not matter, what vlan number is configured on access ports from both sides. That is why MSM is pingable when you made your first configuration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ASA does not support Cisco Discovery Protocol (CDP), so, there is no way to get "Native vlan mistmatch" error.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When you changed your configuration on ASA to vlan 10, ASA starts to tag L2 frames on that interface with tag vlan 10 (802.1q trunk). The frame goes to MSM, but it is configured to accept only untagged frames. In this situation you have to change the port configuration on MSM to accept tagged frames in vlan 10.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When you used to have ASA5505, I suspect you had something like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;interface vlan 10&lt;BR /&gt;&amp;nbsp;ip address xxx.xxx.xxx.xxx 255.255.255.0&lt;/PRE&gt;
&lt;P&gt;Is this case Ethernet 0/0 is configured also as Access port (unless switchport mode trunk is configured), and it also does not tag frames.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2016 07:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947476#M144721</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-11-25T07:03:40Z</dc:date>
    </item>
    <item>
      <title>Hi Boris,</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947477#M144723</link>
      <description>&lt;P&gt;Hi Boris,&lt;/P&gt;
&lt;P&gt;to explain bit further. ASA is configured as native VLAN but no possibility to set VLAN ID as it is physical port that is configured (at least not on 5508X that I use and IOS 9.6.2). When you configure subinterface then you have possibility to set VLAN ID. Yes the MSM720 has untagged port, but again, if there is VLAN 10 untagged on controllers side, and NATIVE vlan (which I presume is VLAN 1) also access or untagged port.&lt;/P&gt;
&lt;P&gt;Quote:&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;ASA with native vlan 1 also does not perform any 802.1q tagging. So from VLAN perspective it absolutely does not matter, what vlan number is configured on access ports from both sides. That is why MSM is pingable when you made your first configuration.&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How come that ID doesn't matter? This is "separation" of&amp;nbsp;the network on the L2...&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2016 08:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947477#M144723</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-11-25T08:08:45Z</dc:date>
    </item>
    <item>
      <title>Hello, the separation on the</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947478#M144727</link>
      <description>&lt;P&gt;Hello, the separation on the L2 can be achived by 802.1q tagging. So, what is the problem? You have vlan 1 on ASA which is untagged and vlan 10 on MSM, which is also untagged. Yes, we have vlan id mistmatch, but everything works fine, isn't is?&lt;/P&gt;
&lt;P&gt;Or. maybe, you want to have one IP subnet on vlan 1 and the other IP subnet on vlan 10? In this case you can simply use another physical interface on ASA (without creating any subinterfaces) and connect it dirrecty to MSM.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2016 08:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947478#M144727</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-11-25T08:16:49Z</dc:date>
    </item>
    <item>
      <title>yeah, you are right. 11 years</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947479#M144729</link>
      <description>&lt;P&gt;yeah, you are right. 11 years ago I was doing CCNA and I forgot some basic things as last 5 years I was a developer. In this case I was confusing things with something else...&lt;/P&gt;
&lt;P&gt;Thank you once again mate.&lt;/P&gt;
&lt;P&gt;Cheers &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2016 08:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947479#M144729</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-11-25T08:43:06Z</dc:date>
    </item>
    <item>
      <title>You are welcome! Good luck! :</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947480#M144730</link>
      <description>&lt;P&gt;You are welcome! Good luck! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2016 09:09:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947480#M144730</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-11-25T09:09:47Z</dc:date>
    </item>
    <item>
      <title>Hi Boris,</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947481#M144733</link>
      <description>&lt;P&gt;Hi Boris,&lt;/P&gt;
&lt;P&gt;I have set everything and it works (at least regarding port forwarding). The thing that I am missing is internet connection from inside to outside. Static NAT is set and I can get from outside (multiple WAN) to that server per specific ports, but I don't have ability to go from server to "cloud/internet"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you please help me with this also?&lt;/P&gt;
&lt;P&gt;(Here is the config - I know there is a lot of things&amp;nbsp;that needs to be cleaned afterwards as I was trying to set, and failed miserably &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;: Saved&lt;/P&gt;
&lt;P&gt;: &lt;BR /&gt;: Serial Number: XXXXXXXXX&lt;BR /&gt;: Hardware: ASA5508, 8192 MB RAM, CPU Atom C2000 series 2000 MHz, 1 CPU (8 cores)&lt;BR /&gt;: Written by enable_15 at 22:59:07.919 GMT Wed Nov 30 2016&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.6(1) &lt;BR /&gt;!&lt;BR /&gt;hostname HC-ClientASA&lt;BR /&gt;enable password xxxxxxxxxxxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool Test_DHCP_VPN 10.20.30.0-10.20.30.100 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xxx.xxx.xxx.74 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; description WAN for ServerTV&lt;BR /&gt; nameif ServerTV&lt;BR /&gt; security-level 80&lt;BR /&gt; ip address 192.168.96.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; description GuestWiFi interface for Access poitns&lt;BR /&gt; nameif GuestWiFi&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.64.1 255.255.248.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; description Parking interface To Server&lt;BR /&gt; nameif ParkingInterface&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.17.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; description Old WAN Interface&lt;BR /&gt; nameif WAN_OLD&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xxx.xxx.xxx.137 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT 0&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network OLD_GW&lt;BR /&gt; host xxx.xxx.xxx.138&lt;BR /&gt; description Old GW Interface&lt;BR /&gt;object network GuestWiFi_NAT_OLD&lt;BR /&gt; subnet 172.16.64.0 255.255.248.0&lt;BR /&gt; description GuestWiFi OLD WAN&lt;BR /&gt;object network NEW_GW&lt;BR /&gt; host xxx.xxx.xxx.73&lt;BR /&gt; description Telia New Gateway&lt;BR /&gt;object network TestGw&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt; description Test NAT&lt;BR /&gt;object network VPN_POOL_10.20.30.0&lt;BR /&gt; subnet 10.20.30.0 255.255.255.128&lt;BR /&gt; description VPN Pool&lt;BR /&gt;object network GuestWiFiNAT&lt;BR /&gt; subnet 172.16.64.0 255.255.248.0&lt;BR /&gt; description NAT for guestWiFi&lt;BR /&gt;object network inside_NAT_OLD&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt; description Inside OLD WAN&lt;BR /&gt;object network ParkingSystem&lt;BR /&gt; subnet 172.16.17.0 255.255.255.0&lt;BR /&gt; description Parking system NAT&lt;BR /&gt;object network ParkingSystem_NAT_OLD&lt;BR /&gt; subnet 172.16.17.0 255.255.255.0&lt;BR /&gt; description Parking S OLD WAN&lt;BR /&gt;object network ParkingSystemServers&lt;BR /&gt; subnet xxx.xxx.xxx.0 255.255.255.0&lt;BR /&gt; description Public WAN from Parking System&lt;BR /&gt;object network ParkingSystemSubnet&lt;BR /&gt; subnet 172.16.17.0 255.255.255.0&lt;BR /&gt; description Parking System Subnet&lt;BR /&gt;object network GuestWiFi&lt;BR /&gt; subnet 172.16.64.0 255.255.248.0&lt;BR /&gt; description GuestWiFi object&lt;BR /&gt;object network ParkingServer1&lt;BR /&gt; host 172.16.17.3&lt;BR /&gt; description ParkingServer1&lt;BR /&gt;object network ParkingServer2&lt;BR /&gt; host 172.16.17.4&lt;BR /&gt; description Parking server 2&lt;BR /&gt;object service TCP_Parking_771&lt;BR /&gt; service tcp source eq 771 &lt;BR /&gt; description Port for Parking server1&lt;BR /&gt;object service TCP_Parking_771_U&lt;BR /&gt; service udp source eq 771 &lt;BR /&gt; description Port for parking server UDP&lt;BR /&gt;object service TCP_Parking2_9100&lt;BR /&gt; service tcp source eq 9100 &lt;BR /&gt; description Parking for server 2 TCP&lt;BR /&gt;object service TCP_Parking2_9100_U&lt;BR /&gt; service udp source eq 9100 &lt;BR /&gt; description TCP_Parking2_9100_UDP&lt;BR /&gt;object network TestLabNAT&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt; description TestLab NAT&lt;BR /&gt;object network GuestWiFiLAB&lt;BR /&gt; subnet 172.16.64.0 255.255.248.0&lt;BR /&gt;object network ParkingInterfaceLAB&lt;BR /&gt; subnet 172.16.17.0 255.255.255.0&lt;BR /&gt; description Test Lab interface&lt;BR /&gt;object network ServerInternet&lt;BR /&gt; subnet 192.168.96.0 255.255.255.0&lt;BR /&gt; description Server Internet In&lt;BR /&gt;object network ServerTVLab&lt;BR /&gt; subnet 192.168.96.0 255.255.255.0&lt;BR /&gt; description Test Lab&lt;BR /&gt;object network ServerTV_OLD&lt;BR /&gt; subnet 192.168.96.0 255.255.255.0&lt;BR /&gt;object network ServerServer&lt;BR /&gt; host 192.168.96.2&lt;BR /&gt; description ConnectionToServer&lt;BR /&gt;object network NETWORK_OBJ_10.20.30.0_25&lt;BR /&gt; subnet 10.20.30.0 255.255.255.128&lt;BR /&gt;object network Parking&lt;BR /&gt; subnet 172.16.17.0 255.255.255.0&lt;BR /&gt;object network ParkingNAT&lt;BR /&gt; subnet 172.16.17.0 255.255.255.0&lt;BR /&gt;object network ParkingSystems&lt;BR /&gt; host xxx.xxx.xxx.120&lt;BR /&gt;object network ParkingInterfaceOLD_WAN&lt;BR /&gt; subnet 172.16.17.0 255.255.255.0&lt;BR /&gt;object network Server1&lt;BR /&gt; subnet 192.168.96.0 255.255.255.0&lt;BR /&gt;object network Server2&lt;BR /&gt; host 192.168.96.2&lt;BR /&gt;object service iPerfServer&lt;BR /&gt; service tcp source eq 5001 &lt;BR /&gt;object network ServerNet&lt;BR /&gt; subnet 192.168.96.0 255.255.255.0&lt;BR /&gt;object network WAN2&lt;BR /&gt; host xxx.xxx.xxx.75&lt;BR /&gt;object network ServerTV2&lt;BR /&gt; host 192.168.96.2&lt;BR /&gt;object network HostNatToOutside&lt;BR /&gt; subnet 192.168.96.0 255.255.255.0&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;BR /&gt; icmp-object echo&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object traceroute&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_2&lt;BR /&gt; icmp-object echo&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object traceroute&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt;object-group service ParkingObj tcp-udp&lt;BR /&gt; port-object eq 771&lt;BR /&gt; port-object eq 9100&lt;BR /&gt;object-group service ParkingPortsNAT tcp-udp&lt;BR /&gt; description OpenPortsForParking&lt;BR /&gt; port-object eq 771&lt;BR /&gt; port-object eq 9100&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_4&lt;BR /&gt; icmp-object echo&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object traceroute&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object tcp-udp destination eq 4500 &lt;BR /&gt; service-object tcp-udp destination eq 500 &lt;BR /&gt; service-object tcp-udp destination eq 5001 &lt;BR /&gt; service-object tcp-udp destination eq 8090 &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object tcp destination eq ssh &lt;BR /&gt; service-object udp destination eq snmp &lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt; network-object object ParkingServer1&lt;BR /&gt; network-object object ParkingServer2&lt;BR /&gt;object-group service NOC_Auth tcp-udp&lt;BR /&gt; port-object eq 8090&lt;BR /&gt;object-group service VPN_IPSec tcp-udp&lt;BR /&gt; port-object eq 4500&lt;BR /&gt; port-object eq 500&lt;BR /&gt;object-group service iPerf tcp-udp&lt;BR /&gt; port-object eq 5001&lt;BR /&gt;access-list inside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1 &lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP any any eq domain &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list Test_Guest remark GuestWiFi network&lt;BR /&gt;access-list Test_Guest standard permit 172.16.64.0 255.255.248.0 &lt;BR /&gt;access-list Test_Guest remark ParkingNetwork&lt;BR /&gt;access-list Test_Guest standard permit 172.16.17.0 255.255.255.0 &lt;BR /&gt;access-list Test_Guest standard permit 192.168.96.0 255.255.255.0 &lt;BR /&gt;access-list Test_Guest standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list GuestWiFi_access_in extended permit icmp any any object-group DM_INLINE_ICMP_2 &lt;BR /&gt;access-list GuestWiFi_access_in extended permit object-group TCPUDP any any eq domain &lt;BR /&gt;access-list GuestWiFi_access_in extended permit ip any any &lt;BR /&gt;access-list ParkingInterface_access_in extended permit object-group TCPUDP any any object-group ParkingObj &lt;BR /&gt;access-list ParkingInterface_access_in extended permit object-group TCPUDP any any eq domain &lt;BR /&gt;access-list ParkingInterface_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any object ServerServer &lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply &lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo &lt;BR /&gt;access-list ServerTVAccessList extended permit tcp any host 192.168.96.2 eq https &lt;BR /&gt;access-list ServerTVAccessList extended permit tcp any host 192.168.96.2 eq ssh &lt;BR /&gt;access-list ServerTVAccessList extended permit tcp any host 192.168.96.2 eq 8090 &lt;BR /&gt;access-list ServerTVAccessList extended permit udp any host 192.168.96.2 eq 8090 &lt;BR /&gt;access-list ServerTVAccessList extended permit udp any host 192.168.96.2 eq snmp &lt;BR /&gt;access-list ServerTVAccessList extended permit udp any host 192.168.96.2 eq 5001 &lt;BR /&gt;access-list ServerTVAccessList extended permit tcp any host 192.168.96.2 eq 5001 &lt;BR /&gt;access-list ServerTVAccessList extended permit tcp any host 192.168.96.2 eq 500 &lt;BR /&gt;access-list ServerTVAccessList extended permit tcp any host 192.168.96.2 eq 4500 &lt;BR /&gt;access-list ServerTVAccessList extended permit udp any host 192.168.96.2 eq 4500 &lt;BR /&gt;access-list ServerTVAccessList extended permit udp any host 192.168.96.2 eq isakmp &lt;BR /&gt;access-list ServerTVAccessList extended permit icmp any any echo-reply &lt;BR /&gt;access-list ServerTV_access_in extended permit icmp any any object-group DM_INLINE_ICMP_4 &lt;BR /&gt;access-list ServerTV_access_in extended permit object-group TCPUDP any any eq domain &lt;BR /&gt;access-list ServerTV_access_in extended permit ip any any &lt;BR /&gt;access-list WAN_OLD_access_in extended permit object-group TCPUDP xxx.xxx.xxx.0 255.255.255.0 object-group DM_INLINE_NETWORK_6 object-group ParkingPortsNAT &lt;BR /&gt;access-list WAN_OLD_access_in extended permit ip object ParkingSystems object ParkingSystemSubnet &lt;BR /&gt;access-list WAN_OLD_access_in extended permit ip any object ParkingSystemSubnet &lt;BR /&gt;access-list WAN_OLD_access_in extended permit ip any any inactive &lt;BR /&gt;access-list WAN_OLD_access_in extended permit icmp any any echo-reply &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu ServerTV 1500&lt;BR /&gt;mtu GuestWiFi 1500&lt;BR /&gt;mtu ParkingInterface 1500&lt;BR /&gt;mtu WAN_OLD 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any GuestWiFi&lt;BR /&gt;icmp permit any ParkingInterface&lt;BR /&gt;asdm image disk0:/asdm-762-150.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static any any destination static VPN_POOL_10.20.30.0 VPN_POOL_10.20.30.0 no-proxy-arp route-lookup&lt;BR /&gt;nat (ParkingInterface,WAN_OLD) source static ParkingServer1 interface service any TCP_Parking_771&lt;BR /&gt;nat (ParkingInterface,WAN_OLD) source static ParkingServer1 interface service any TCP_Parking_771_U&lt;BR /&gt;nat (ParkingInterface,WAN_OLD) source static ParkingServer2 interface service any TCP_Parking2_9100&lt;BR /&gt;nat (ParkingInterface,WAN_OLD) source static ParkingServer2 interface service any TCP_Parking2_9100_U&lt;BR /&gt;!&lt;BR /&gt;object network GuestWiFi_NAT_OLD&lt;BR /&gt; nat (GuestWiFi,WAN_OLD) dynamic interface dns&lt;BR /&gt;object network inside_NAT_OLD&lt;BR /&gt; nat (inside,WAN_OLD) dynamic interface dns&lt;BR /&gt;object network ServerServer&lt;BR /&gt; nat (ServerTV,outside) static interface&lt;BR /&gt;object network ParkingInterfaceOLD_WAN&lt;BR /&gt; nat (ParkingInterface,WAN_OLD) dynamic interface dns&lt;BR /&gt;object network ServerTV2&lt;BR /&gt; nat (ServerTV,outside) static WAN2&lt;BR /&gt;access-group ServerTVAccessList in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group ServerTV_access_in in interface ServerTV&lt;BR /&gt;access-group GuestWiFi_access_in in interface GuestWiFi&lt;BR /&gt;access-group ParkingInterface_access_in in interface ParkingInterface&lt;BR /&gt;access-group WAN_OLD_access_in in interface WAN_OLD&lt;BR /&gt;route WAN_OLD 0.0.0.0 0.0.0.0 xxx.xxx.xxx.138 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.73 2&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 172.16.64.0 255.255.248.0 GuestWiFi&lt;BR /&gt;http 10.20.30.0 255.255.255.0 GuestWiFi&lt;BR /&gt;http 172.16.17.0 255.255.255.0 ParkingInterface&lt;BR /&gt;http 192.168.96.0 255.255.255.0 ServerTV&lt;BR /&gt;http xxx.xxx.xxx.72 255.255.255.248 outside&lt;BR /&gt;http xxx.xxx.xxx.136 255.255.255.252 WAN_OLD&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map WAN_OLD_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map WAN_OLD_map interface WAN_OLD&lt;BR /&gt;crypto map TestLab_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; enrollment self&lt;BR /&gt; subject-name CN=HC-ClientASA&lt;BR /&gt; keypair HC_Client_Odense&lt;BR /&gt; proxy-ldc-issuer&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt; certificate 50de3358&lt;BR /&gt; 30820551 30820339 a0030201 02020450 de335830 0d06092a 864886f7 0d010105 &lt;BR /&gt; 0a517ac1 5d1eb7a3 1dca77f7 054b0615 7a85096b 87b3d32f b86e61b5 78fa6364 &lt;BR /&gt; 08d932b7 2e73d1a9 1acdef89 a5cf7dd2 a9dfa34c b5086cd2 6f954b83 680c5fcc &lt;BR /&gt; dee06f08 7030ff8d 729458e4 59780d58 ae72b300 4a0b2e7a ac608cb7 cd5ce92a&lt;BR /&gt; d09a07cb ea159809 1dc1b666 a1401ea3 bb7e9203 f905c696 aee9d2f6 93978e82 &lt;BR /&gt; 4b6ec24e ab695964 64fd929c d0cfc46b dea848e5 d3cf56cb 08a2991f 7ddee7ef &lt;BR /&gt; 5ed8869f 0be2a5ed dba14771 0d23ae29 6ebf7640 381106ff 99c1d56a 7d5ec7ad &lt;BR /&gt; cd432009 2ef4248e aa9b42b8 a71ead22 14b38dcb e343c945 064796d3 1e337d75 &lt;BR /&gt; baccf54c 209b67f8 0e4e8fa8 cf7ce3f1 99cddf3b 18eced0d 770448aa 1b37d65a &lt;BR /&gt; 09574ee9 d5985c00 bdb804c3 9c0e069e 9eaa50e3 b4694174 e17251b4 fc0bc169 &lt;BR /&gt; 845b7639 ebc47f37 894b5a5f d5662fa9 40b9898c 86a44b6b 805cb0ba 8607499d &lt;BR /&gt; 2c330359 c0b30ef1 046b01b2 bad5d514 efea8647 55db6819 4eaf2da2 59e219b8 &lt;BR /&gt; e8ff9053 f4e630b8 34f631c7 c49062a5 a0239c9a ef&lt;BR /&gt; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 enable WAN_OLD client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh xxx.xxx.xxx.72 255.255.255.248 outside&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 GuestWiFi&lt;BR /&gt;ssh 172.16.64.0 255.255.248.0 GuestWiFi&lt;BR /&gt;ssh 10.20.30.0 255.255.255.0 GuestWiFi&lt;BR /&gt;ssh xxx.xxx.xxx.136 255.255.255.252 WAN_OLD&lt;BR /&gt;ssh timeout 10&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access GuestWiFi&lt;/P&gt;
&lt;P&gt;dhcp-client client-id interface outside&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.96.3-192.168.96.254 ServerTV&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface ServerTV&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.16.64.2-172.16.64.250 GuestWiFi&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface GuestWiFi&lt;BR /&gt;dhcpd enable GuestWiFi&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.16.17.33-172.16.17.250 ParkingInterface&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.8.8 interface ParkingInterface&lt;BR /&gt;dhcpd enable ParkingInterface&lt;BR /&gt;!&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 ServerTV&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 GuestWiFi&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 ParkingInterface&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 WAN_OLD&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; enable WAN_OLD&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-4.3.01095-k9.pkg 1&lt;BR /&gt; anyconnect profiles Test_GuestWiFi_client_profile disk0:/Test_GuestWiFi_client_profile.xml&lt;BR /&gt; anyconnect profiles VPN_Test_client_profile disk0:/VPN_Test_client_profile.xml&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt; cache&lt;BR /&gt; disable&lt;BR /&gt; error-recovery disable&lt;BR /&gt;group-policy GroupPolicy_VPN_Test internal&lt;BR /&gt;group-policy GroupPolicy_VPN_Test attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol ikev2 ssl-client &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Test_Guest&lt;BR /&gt; default-domain none&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value VPN_Test_client_profile type user&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin password xxxxxxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group VPN_Test type remote-access&lt;BR /&gt;tunnel-group VPN_Test general-attributes&lt;BR /&gt; address-pool Test_DHCP_VPN&lt;BR /&gt; default-group-policy GroupPolicy_VPN_Test&lt;BR /&gt;tunnel-group VPN_Test webvpn-attributes&lt;BR /&gt; group-alias VPN_Test enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:14a2b233fa9e205b5a530e7925ef77ac&lt;BR /&gt;: end&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 08:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947481#M144733</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-12-01T08:28:04Z</dc:date>
    </item>
    <item>
      <title>Hello, try to use packet</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947482#M144734</link>
      <description>&lt;P&gt;Hello, try to use packet-tracer utility to verify packet flow. It will show you the reason, why the traffic is droped.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For example, let's emulate http-request from 192.168.96.2 Server to google.com (IP address 74.125.232.238). To emulate this transaction issue:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input ServerTV tcp 192.168.96.2 56123 74.125.232.238 80&lt;/PRE&gt;</description>
      <pubDate>Thu, 01 Dec 2016 08:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947482#M144734</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-12-01T08:38:54Z</dc:date>
    </item>
    <item>
      <title>Hi Boris,</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947483#M144736</link>
      <description>&lt;P&gt;Hi Boris,&lt;/P&gt;
&lt;P&gt;since nothing is currently connected to this server (there isn't device attached&amp;nbsp;on that IP address on that port, is it possible to simulate that?).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have set two different subnets (WAN). WAN1 for guestWiFi and default route metric 1 (dynamic NAT), WAN2 should be for TV server, and for that I have set default route of WAN2 with metric 2 (static NAT). Access lists for both networks are set to allow from inside to outside without any restrictions, so permit any any... There must be something with NAT that is blocking, as I can get access from outside to inside, but from inside to outside I cannot. Reading the configuration, I cannot find why...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 09:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947483#M144736</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-12-01T09:30:58Z</dc:date>
    </item>
    <item>
      <title>Hello, if input and output</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947484#M144737</link>
      <description>&lt;P&gt;Hello, if input and output interfaces are in "UP" states, you can use packet-tracer.&lt;/P&gt;
&lt;P&gt;As I see from the config, WAN1 is connected to WAN_OLD interface (metric 1) and WAN2 is connected to outside interface (metric 2).&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;route WAN_OLD 0.0.0.0 0.0.0.0 xxx.xxx.xxx.138 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.73 2&lt;/PRE&gt;
&lt;P&gt;Since WAN1 (WAN_OLD) interface has metric 1 as default route it will always be used for outgoing traffic (traffic, initiated from inside of ASA). So, I assume, that you miss a NAT rule for Server-subnet. For example,&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network Server-net&lt;BR /&gt;&amp;nbsp;subnet 192.168.96.0 255.255.255.0&lt;BR /&gt; nat (ServerTV,&lt;SPAN&gt;WAN_OLD) dynamic interface&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;also, if you want to use ping for tesing, add icmp inspection:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt; &amp;nbsp;inspect icmp&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 10:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947484#M144737</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-12-01T10:03:21Z</dc:date>
    </item>
    <item>
      <title>Yes, you are absolutely</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947485#M144738</link>
      <description>&lt;P&gt;Yes, you are absolutely correct. It occurred me just few minutes ago that might be the route thing. (for that reason I opened new discussion on Cisco on this link mentioning two static routes with metrics... &lt;A href="https://supportforums.cisco.com/discussion/13175596/static-nat-internet-connectivity-issue-asa" target="_blank" title="Static NAT issue"&gt;https://supportforums.cisco.com/discussion/13175596/static-nat-internet-connectivity-issue-asa&lt;/A&gt;). You are correct, it will never reach outside as it doesn't have route for that interface. But will this somehow sc*** current static NAT that is set and working?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 10:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947485#M144738</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-12-01T10:20:57Z</dc:date>
    </item>
    <item>
      <title>Current static NAT will be ok</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947486#M144740</link>
      <description>&lt;P&gt;Current static NAT will be ok despite routing. That is the ASA's speciality. ASA is flow-oriented gear (comparing to routers). If the session in initiated from outside (through the outside interface), ASA records both input and output interfaces. So, when return packect reach the ASA, it will look at the session records and get the output interface from there. So the return packets will be sent through outside interface (not WAN_OLD interface), despite the routing table.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 10:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947486#M144740</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-12-01T10:37:29Z</dc:date>
    </item>
    <item>
      <title>Hi Boris,</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947487#M144741</link>
      <description>&lt;P&gt;Hi Boris,&lt;/P&gt;
&lt;P&gt;I must admit that I am bit confused here. If you initiate traffic from ServerTV through WAN_OLD it has translation of xxx.xxx.xxx.xxy and it is written in header of each packet. When it gets back, it is using same IP xxx.xxx.xxx.xxy as it is initiated from, correct? So how come it can forward reply to other WAN2 xxx.xxx.xxx.xxz?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 15:23:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947487#M144741</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-12-01T15:23:45Z</dc:date>
    </item>
    <item>
      <title>Hello, you say everything</title>
      <link>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947488#M144742</link>
      <description>&lt;P&gt;Hello, you say everything correct &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If you initiate traffic from ServerTV, the ASA will check for its connection table and will not find any establited connections, since the session is being just initialized. So the ASA will check routing table and find the output interface WAN_OLD (due to &lt;SPAN&gt;route WAN_OLD 0.0.0.0 0.0.0.0 xxx.xxx.xxx.138 1).&lt;/SPAN&gt;&amp;nbsp;The source IP in packets will always be translated to xxx.xxx.xxx.xxy. The return packets will always have destination IP of xxx.xxx.xxx.xxy and will come back through WAN_OLD.&lt;/P&gt;
&lt;P&gt;BUT&lt;/P&gt;
&lt;P&gt;If you initiate traffic from somewhere in Internet to ServerTV to the public IP address xxx.xxx.xxx.xxZ, the packets will have dest. IP xxx.xxx.xxx.xxZ and will come to ASA through OUTSIDE interface (not WAN_OLD interface). So the packets will have their dest IP translated to ServetTV private IP addresses and will reach the ServerTV. The ASA will make a record in the connection table about this session. Then ServerTV will send answering packets to ASA. The ASA will check its connection table and see that the session is already established through the pair of interfaces OUTSIDE -&amp;gt; ServerTV. So the return packets will have to use the same pait of interfaces ServerTV -&amp;gt; OUTSIDE. So, the return packets will leave OUTSIDE interface of the ASA, despite the default route is configured through WAN_OLD interface with a better metric.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 06:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-wan-on-same-interface-in-asa/m-p/2947488#M144742</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-12-02T06:50:16Z</dc:date>
    </item>
  </channel>
</rss>

