<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuring Traffic Zone on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-traffic-zone-on-asa/m-p/3074553#M146159</link>
    <description>&lt;P&gt;I have dual-ISP connection (failover) at the edge of campus network. We are setting up the new ASA with multiple contexts. Since IP SLA is not supported under multiple context mode, we are trying to go with Traffic Zone feature to maintain the Dual-ISP failover functionality. However the confusion is: there is no configurable option to tweak for a better predictability of how the failover would work with zones...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is a picture stolen from configure guide that represents the setup (we only have two ISPs instead of four in the diagram).&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/dam/en/us/td/i/300001-400000/370001-380000/373001-374000/373595.eps/_jcr_content/renditions/373595.jpg" target="_blank"&gt;http://www.cisco.com/c/dam/en/us/td/i/300001-400000/370001-380000/373001-374000/373595.eps/_jcr_content/renditions/373595.jpg&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So questions:&lt;/P&gt;
&lt;P&gt;1. If one ISP failed, say the medium between ASA and ISP CE failed, how does ASA detect the failover for switchover?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. For outbound NAT, how to NAT to individual IP addresses from each ISP dynamically? Say I have one&amp;nbsp;/24 subnet on LAN and one /24 subnet on DMZ need to be NATed when sending traffic through ASA to Internet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network LAN1-NAT-ISP1&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;subnet 10.18.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network DMZ-NAT-ISP1&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;subnet 172.16.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network LAN1-NAT-ISP2&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;subnet 10.18.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network DMZ-NAT-ISP2&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;subnet 172.16.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Option#1, do dynamic PAT Pool:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network ISP1-NAT-1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;host 205.101.27.126&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network ISP1-NAT-2&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;host 205.101.27.127&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object-group network ISP1-NAT-Pool&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;network-object object ISP1-NAT-1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;network-object object ISP1-NAT-2&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network LAN1-NAT-ISP1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;nat (Inside,any) dynamic pat-pool ISP1-NAT-Pool&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network LAN1-NAT-ISP2&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;nat (Inside,any) dynamic 18.195.59.126&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network DMZ-NAT-ISP1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;nat (DMZ,any) dynamic pat-pool ISP1-NAT-Pool&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network DMZ-NAT-ISP2&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;nat (DMZ,any) dynamic 18.195.59.126&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Option#2, do a simple dynamic PAT to non-interface address&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network LAN1-NAT-ISP1&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (Inside,any) dynamic 205.101.27.126&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network LAN1-NAT-ISP2&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (Inside,any) dynamic 18.195.59.126&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network DMZ-NAT-ISP1&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (DMZ,any) dynamic 205.101.27.126&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network DMZ-NAT-ISP2&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (DMZ,any) dynamic 18.195.59.126&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;3. If above commands are correct for the setup, then why ASA complains "WARNING: Pool (&lt;EM&gt;205.101.27.126&lt;/EM&gt;) overlap with existing pool."? Does this mean ASA wont be able to smartly forward traffic outbound for NAT?&lt;/P&gt;
&lt;P&gt;4. If the above commands are correct for the setup, then again as question#1, how does the firewall decide which ISP to use?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Wish there is some kinda whitepaper OR tac document to better explain this...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;/S&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:59:47 GMT</pubDate>
    <dc:creator>SIMMN</dc:creator>
    <dc:date>2019-03-12T08:59:47Z</dc:date>
    <item>
      <title>Configuring Traffic Zone on ASA</title>
      <link>https://community.cisco.com/t5/network-security/configuring-traffic-zone-on-asa/m-p/3074553#M146159</link>
      <description>&lt;P&gt;I have dual-ISP connection (failover) at the edge of campus network. We are setting up the new ASA with multiple contexts. Since IP SLA is not supported under multiple context mode, we are trying to go with Traffic Zone feature to maintain the Dual-ISP failover functionality. However the confusion is: there is no configurable option to tweak for a better predictability of how the failover would work with zones...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is a picture stolen from configure guide that represents the setup (we only have two ISPs instead of four in the diagram).&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/dam/en/us/td/i/300001-400000/370001-380000/373001-374000/373595.eps/_jcr_content/renditions/373595.jpg" target="_blank"&gt;http://www.cisco.com/c/dam/en/us/td/i/300001-400000/370001-380000/373001-374000/373595.eps/_jcr_content/renditions/373595.jpg&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So questions:&lt;/P&gt;
&lt;P&gt;1. If one ISP failed, say the medium between ASA and ISP CE failed, how does ASA detect the failover for switchover?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. For outbound NAT, how to NAT to individual IP addresses from each ISP dynamically? Say I have one&amp;nbsp;/24 subnet on LAN and one /24 subnet on DMZ need to be NATed when sending traffic through ASA to Internet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network LAN1-NAT-ISP1&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;subnet 10.18.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network DMZ-NAT-ISP1&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;subnet 172.16.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network LAN1-NAT-ISP2&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;subnet 10.18.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network DMZ-NAT-ISP2&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;subnet 172.16.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Option#1, do dynamic PAT Pool:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network ISP1-NAT-1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;host 205.101.27.126&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network ISP1-NAT-2&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;host 205.101.27.127&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object-group network ISP1-NAT-Pool&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;network-object object ISP1-NAT-1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;network-object object ISP1-NAT-2&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network LAN1-NAT-ISP1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;nat (Inside,any) dynamic pat-pool ISP1-NAT-Pool&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network LAN1-NAT-ISP2&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;nat (Inside,any) dynamic 18.195.59.126&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network DMZ-NAT-ISP1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;nat (DMZ,any) dynamic pat-pool ISP1-NAT-Pool&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;object network DMZ-NAT-ISP2&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;nat (DMZ,any) dynamic 18.195.59.126&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Option#2, do a simple dynamic PAT to non-interface address&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network LAN1-NAT-ISP1&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (Inside,any) dynamic 205.101.27.126&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network LAN1-NAT-ISP2&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (Inside,any) dynamic 18.195.59.126&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network DMZ-NAT-ISP1&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (DMZ,any) dynamic 205.101.27.126&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network DMZ-NAT-ISP2&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (DMZ,any) dynamic 18.195.59.126&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;3. If above commands are correct for the setup, then why ASA complains "WARNING: Pool (&lt;EM&gt;205.101.27.126&lt;/EM&gt;) overlap with existing pool."? Does this mean ASA wont be able to smartly forward traffic outbound for NAT?&lt;/P&gt;
&lt;P&gt;4. If the above commands are correct for the setup, then again as question#1, how does the firewall decide which ISP to use?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Wish there is some kinda whitepaper OR tac document to better explain this...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;/S&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-traffic-zone-on-asa/m-p/3074553#M146159</guid>
      <dc:creator>SIMMN</dc:creator>
      <dc:date>2019-03-12T08:59:47Z</dc:date>
    </item>
    <item>
      <title>If you are going to go with</title>
      <link>https://community.cisco.com/t5/network-security/configuring-traffic-zone-on-asa/m-p/3074554#M146161</link>
      <description>&lt;P&gt;If you are going to go with multi-context mode (can you get rid of this) then I think you will need a dynamic routing protocol with each ISP link.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2017 02:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-traffic-zone-on-asa/m-p/3074554#M146161</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2017-03-02T02:55:05Z</dc:date>
    </item>
    <item>
      <title>No, cannot get rid of context</title>
      <link>https://community.cisco.com/t5/network-security/configuring-traffic-zone-on-asa/m-p/3074555#M146163</link>
      <description>&lt;P&gt;No, cannot get rid of context. Even I did, dynamic routing does not solve NAT and fail over. Plus barely any isp would peer with customer for NON-bgp.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2017 04:09:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-traffic-zone-on-asa/m-p/3074555#M146163</guid>
      <dc:creator>SIMMN</dc:creator>
      <dc:date>2017-03-02T04:09:18Z</dc:date>
    </item>
  </channel>
</rss>

