<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The private addresses are in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048961#M144924</link>
    <description>&lt;P&gt;The private addresses are only examples here. Typically you configure your two outside interfaces with the public IPs that you got from your ISP.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Apr 2017 08:21:47 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2017-04-19T08:21:47Z</dc:date>
    <item>
      <title>active/standby asa with dual ISP connections</title>
      <link>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048960#M144923</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am very confused about the config for the outside switches for active/standby asa with dual ISP connections. The image below is from the&amp;nbsp;firewall and ips design CVD.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If the ASA's&amp;nbsp;outside interfaces are in the private address range how does one on the internet access the services behind the firewall if the public routable IP is not on the firewalls? How would vpn access work? Or how would you NAT insides services to the public ip's?&lt;/P&gt;
&lt;P&gt;Does anyone have a sample config for the outside switches?&lt;/P&gt;
&lt;P&gt;Inside network----(IN)ASA(OUT)----Private_IP---Outside Switches---Public /30 IP---Internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/dual-isp.png" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048960#M144923</guid>
      <dc:creator>Madura Malwatte</dc:creator>
      <dc:date>2019-03-12T09:14:08Z</dc:date>
    </item>
    <item>
      <title>The private addresses are</title>
      <link>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048961#M144924</link>
      <description>&lt;P&gt;The private addresses are only examples here. Typically you configure your two outside interfaces with the public IPs that you got from your ISP.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 08:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048961#M144924</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-04-19T08:21:47Z</dc:date>
    </item>
    <item>
      <title>Thanks for replying. So in</title>
      <link>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048962#M144925</link>
      <description>&lt;P&gt;Thanks for replying. So in that case would it be like this:&lt;/P&gt;
&lt;P&gt;- ASA primary would have 2 public IP's configured. there would not be any standby IP for each of the public IP's because the isp only provides 1 free public ip. I assume this would not affect failover as the standby ASA would get the&amp;nbsp;same public IP used by the primary during failover?&lt;/P&gt;
&lt;P&gt;- outside switches will be purely L2 for this traffic. Just trunking&amp;nbsp;two vlans (one for each ISP)?&lt;/P&gt;
&lt;P&gt;- would&amp;nbsp;there be a duplication of the NAT configuration (one for each outside interface)?&lt;/P&gt;
&lt;P&gt;- is there any good configuration examples which includes what the NAT config would look like for dual ISP and also outside switches?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 15:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048962#M144925</guid>
      <dc:creator>Madura Malwatte</dc:creator>
      <dc:date>2017-04-19T15:33:56Z</dc:date>
    </item>
    <item>
      <title>you are right with your</title>
      <link>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048963#M144926</link>
      <description>&lt;P&gt;you are right with your assumptions. You don't need to have standby IPs, although the detection of failover conditions is limited. But that &amp;nbsp;is probably not relevant in your scenario.&lt;/P&gt;
&lt;P&gt;All NAT has to be duplicated for both interfaces and you need to have a backup default-route with higher&amp;nbsp;AD configured to your secondary ISP.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 15:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-standby-asa-with-dual-isp-connections/m-p/3048963#M144926</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-04-19T15:37:16Z</dc:date>
    </item>
  </channel>
</rss>

