<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You don't need the upstream in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021710#M146873</link>
    <description>&lt;P&gt;You don't need the upstream tracking here. That is done automatically by the ISP-routers. The redundant interfaces help with failures of ASA interfaces or the outside switch.&lt;/P&gt;
&lt;P&gt;And yes, you bundle physical interfaces in the same bridge-group and configure all&amp;nbsp;parameters (nameif, ip, sec-level) on the bvi. An example is shown in the config guide for the &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa97/configuration/general/asa-97-general-config/intro-start.html#concept_BE56002F4C3C4B478BDCC44A530076E0"&gt;5506-default config&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Feb 2017 08:28:08 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2017-02-06T08:28:08Z</dc:date>
    <item>
      <title>Connecting Cisco ASA to 2 internet lines - best practice</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021704#M146852</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have a primary SIP trunk for internet with a backup EFM circuit. Both lines terminate in a seperate&amp;nbsp;ISP-managed router. The customer-side interfaces of both routers need to be connected on the same physical segment for HSRP failover (i.e.&amp;nbsp;the outside interface of the ASA, the HSRP interface and the inside interface of the 2&amp;nbsp;ISP routers are all on the same subnet).&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I've currently got a 1Gig mini-switch sitting between the ISP routers and the ASA but I don't like having this additional point of failure and potential bottleneck.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there a better way to do it? Can an ASA support direct connection to the ISP routers and have 2&amp;nbsp;interfaces on the same subnet?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021704#M146852</guid>
      <dc:creator>craig5258</dc:creator>
      <dc:date>2019-03-12T08:53:02Z</dc:date>
    </item>
    <item>
      <title>You can also configure it the</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021705#M146855</link>
      <description>&lt;P&gt;You can also configure it the following way:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;two mini-switches connected to each orher&lt;/LI&gt;
&lt;LI&gt;Connect Router1&amp;nbsp;to switch1&lt;/LI&gt;
&lt;LI&gt;Connect Router2 to switch2&lt;/LI&gt;
&lt;LI&gt;connect two ASA interfaces, one to each switch.&lt;/LI&gt;
&lt;LI&gt;combine both interfaces to a redundant interface&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="-webkit-text-size-adjust: 100%;"&gt;Or if you are really brave, you can upgrade to ASA version 9.7(1) and combine two interfaces into one bridge-group and connect both routers directly to the ASA.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 16:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021705#M146855</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-02-03T16:21:14Z</dc:date>
    </item>
    <item>
      <title>Instead of using redundant</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021706#M146859</link>
      <description>&lt;P&gt;Instead of using redundant interfaces, you could stack the switches, and then create a portchannel between the ASA and the stack(one link to each switch). &amp;nbsp;Then also cable one router into one switch and the other router into the second switch.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 19:26:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021706#M146859</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-03T19:26:55Z</dc:date>
    </item>
    <item>
      <title>Mini-switch with stacking?</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021707#M146863</link>
      <description>&lt;P&gt;Mini-switch with stacking? Don't think so ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 19:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021707#M146863</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-02-03T19:38:44Z</dc:date>
    </item>
    <item>
      <title>overlooked the mini switch :</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021708#M146866</link>
      <description>&lt;P&gt;overlooked the mini switch :-s&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 21:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021708#M146866</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-03T21:39:56Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply.</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021709#M146870</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I wasn't aware of interface redundancy on ASAs but it's on my radar now - thanks. It would only help in this case if you could link the redudnancy/failover to an IP SLA or similar so that if the SIP trunk failed upstream, the ASA interface would flip over. Otherwise, it would only failover if the inside interface of router1 went down - which is less likely.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I did read something about bridging groups - they sit behind a bridged virtual interface don't they? I thought that was my answer until I realised my ASA doesn't support them. So, I'll investigate the upgrade to 9.7(1). I've got a spare firewall so I can do some testing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 08:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021709#M146870</guid>
      <dc:creator>craig5258</dc:creator>
      <dc:date>2017-02-06T08:13:13Z</dc:date>
    </item>
    <item>
      <title>You don't need the upstream</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021710#M146873</link>
      <description>&lt;P&gt;You don't need the upstream tracking here. That is done automatically by the ISP-routers. The redundant interfaces help with failures of ASA interfaces or the outside switch.&lt;/P&gt;
&lt;P&gt;And yes, you bundle physical interfaces in the same bridge-group and configure all&amp;nbsp;parameters (nameif, ip, sec-level) on the bvi. An example is shown in the config guide for the &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa97/configuration/general/asa-97-general-config/intro-start.html#concept_BE56002F4C3C4B478BDCC44A530076E0"&gt;5506-default config&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 08:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021710#M146873</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-02-06T08:28:08Z</dc:date>
    </item>
    <item>
      <title>Sorry - I missed the bit</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021711#M146875</link>
      <description>&lt;P&gt;Sorry - I missed the bit about connecting the mini-switches to each other. I was thinking that the ASA interface failover would need to mirror the HSRP failover. So, yes - this would do the job without any software upgrades. Thanks.&lt;/P&gt;
&lt;P&gt;I'll check out the BVI config though - I'd be interested to see it working.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 08:41:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-to-2-internet-lines-best-practice/m-p/3021711#M146875</guid>
      <dc:creator>craig5258</dc:creator>
      <dc:date>2017-02-06T08:41:34Z</dc:date>
    </item>
  </channel>
</rss>

