<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I used this to make the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000667#M156830</link>
    <description>&lt;P&gt;I used this to make the changes and it appears to switch default routes fine. It just isn't allowing any traffic through the 2nd connection.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Aug 2016 13:03:24 GMT</pubDate>
    <dc:creator>Bernard Incarnato</dc:creator>
    <dc:date>2016-08-02T13:03:24Z</dc:date>
    <item>
      <title>Dual ISP ASA 9.1</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000664#M156792</link>
      <description>&lt;P&gt;Trying to get a secondary ISP connection setup on a client's ASA, version 9.1. The issue I am having is that no traffic flows out the secondary connection when I disable the primary. I am assuming it has to do with NAT and/or ACLs but these are something I haven't been able to wrap my head around. I just don't understand it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Attached is the current config and I have setup the route, the monitoring, but stuck there.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any/all guidance is appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:04:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000664#M156792</guid>
      <dc:creator>Bernard Incarnato</dc:creator>
      <dc:date>2019-03-12T08:04:51Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000665#M156804</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Check the below link for basic configuration with dual ISPs-&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118962-configure-asa-00.html&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2016 23:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000665#M156804</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2016-08-01T23:41:37Z</dc:date>
    </item>
    <item>
      <title>Your routing is ok (two</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000666#M156816</link>
      <description>&lt;P&gt;Your routing is ok (two default-routes with different AD), but you don't have a dynamic NAT/PAT to your backup interface. It has to be configured the same way as you have for your primary interface:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;nat (inside,backup) after-auto source dynamic any interface
&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 05:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000666#M156816</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-02T05:49:34Z</dc:date>
    </item>
    <item>
      <title>I used this to make the</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000667#M156830</link>
      <description>&lt;P&gt;I used this to make the changes and it appears to switch default routes fine. It just isn't allowing any traffic through the 2nd connection.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 13:03:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000667#M156830</guid>
      <dc:creator>Bernard Incarnato</dc:creator>
      <dc:date>2016-08-02T13:03:24Z</dc:date>
    </item>
    <item>
      <title>I'm a novice when it comes to</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000668#M156841</link>
      <description>&lt;P&gt;I'm a novice when it comes to these things so I will see if I can track down/figure out the commands to add.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 13:04:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000668#M156841</guid>
      <dc:creator>Bernard Incarnato</dc:creator>
      <dc:date>2016-08-02T13:04:11Z</dc:date>
    </item>
    <item>
      <title>Well, the needed command is</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000669#M156848</link>
      <description>&lt;P&gt;Well, the needed command is already given. If you wan't to dig deeper into NAT, you can start with the &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/firewall/asa_91_firewall_config/nat_overview.html"&gt;config guide&lt;/A&gt; or a &lt;A href="http://www.ciscopress.com/store/cisco-asa-all-in-one-next-generation-firewall-ips-and-9781587143076"&gt;good book&lt;/A&gt; on the ASA.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 13:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000669#M156848</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-02T13:51:27Z</dc:date>
    </item>
    <item>
      <title>Understood and I appreciate</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000670#M156853</link>
      <description>&lt;P&gt;Understood and I appreciate the guidance. I will see how I fare... Thanks again.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 13:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000670#M156853</guid>
      <dc:creator>Bernard Incarnato</dc:creator>
      <dc:date>2016-08-02T13:53:15Z</dc:date>
    </item>
    <item>
      <title>Was able to go onsite and</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000671#M156857</link>
      <description>&lt;P&gt;Was able to go onsite and apply this today. Happy to report it worked like a champ! Thanks again for the guidance! I do appreciate it!&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2016 20:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-asa-9-1/m-p/3000671#M156857</guid>
      <dc:creator>Bernard Incarnato</dc:creator>
      <dc:date>2016-08-03T20:13:24Z</dc:date>
    </item>
  </channel>
</rss>

