<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic  Hi Vibhor,This is how I in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767438#M178800</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;This is how I envision this setup,&lt;/P&gt;&lt;P&gt;QUESTION: Does this seem correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Border 6500-1 peers with ISP&amp;nbsp;via BGP&lt;/LI&gt;&lt;LI&gt;Global Routing Table (&lt;EM&gt;GRT&lt;/EM&gt;) will hold&amp;nbsp;BGP prefixes (&lt;EM&gt;perhaps full internet routing table&lt;/EM&gt;)&lt;/LI&gt;&lt;LI&gt;From &lt;EM&gt;GRT&lt;/EM&gt;,&amp;nbsp;20 of our remote site BGP prefixes redistribute into OSPF.&lt;/LI&gt;&lt;LI&gt;DMZ virtual contexts,currently 12 DMZs&lt;UL&gt;&lt;LI&gt;#.#.0.0/24&lt;/LI&gt;&lt;LI&gt;#.#.1.0/24&lt;/LI&gt;&lt;LI&gt;#.#.2.0/24&lt;/LI&gt;&lt;LI&gt;#.#.3.0/24&lt;/LI&gt;&lt;LI&gt;etc.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;DMZ environments&amp;nbsp;are layer-2 only&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Virtual context 1 is the default-gateway for virtual context 1 nodes&lt;/LI&gt;&lt;LI&gt;Virtual context 2&amp;nbsp;is the default-gateway for&amp;nbsp;virtual context 2 nodes&lt;/LI&gt;&lt;LI&gt;Virtual context 3&amp;nbsp;is the default-gateway for&amp;nbsp;virtual context 3 nodes, etc.&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;OSPF dynamically&amp;nbsp;generates 0/0 and announces to internal net&lt;/LI&gt;&lt;LI&gt;OSPF announces each DMZ virtual context net to the internal network (&lt;EM&gt;optional&lt;/EM&gt;)&lt;/LI&gt;&lt;LI&gt;OSPF nets are also redistributed into BGP and announced to ISP&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;6500-1 and&amp;nbsp;6500-2 perform identical&amp;nbsp;functions&lt;/LI&gt;&lt;LI&gt;6500-1 and 6500-2 peer&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your assistance&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 19 Sep 2015 14:26:34 GMT</pubDate>
    <dc:creator>fsebera</dc:creator>
    <dc:date>2015-09-19T14:26:34Z</dc:date>
    <item>
      <title>6500 with ASA Service module, full Internet routing table and OSPF routing</title>
      <link>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767434#M178796</link>
      <description>&lt;P style="font-size: 14.4px; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.4px; line-height: normal;"&gt;We are looking to purchase at least two&amp;nbsp;Cisco 6500 series switches with the latest sup engines as-well-as the Cisco ASA service modules.&lt;/P&gt;&lt;P style="font-size: 14.4px; line-height: normal;"&gt;My&amp;nbsp;question is, could we have the all of the following in the same box and place this setup at the perimeter?&lt;/P&gt;&lt;UL style="margin-top: 15px; margin-bottom: 0px; font-size: 14.4px; line-height: normal;"&gt;&lt;LI style="margin: 5px 0px;"&gt;BGP routing with the full internet routing table of about 550k prefixes&lt;/LI&gt;&lt;LI style="margin: 5px 0px;"&gt;OSPF for internal routing&lt;/LI&gt;&lt;LI style="margin: 5px 0px;"&gt;Redistribution from OSPF into BGP (public OSPF prefixes to BGP)&lt;/LI&gt;&lt;LI style="margin: 5px 0px;"&gt;Routed multi-context mode for our multiple&amp;nbsp;separate dmz environments&lt;/LI&gt;&lt;LI style="margin: 5px 0px;"&gt;AnyConnect VPN client termination in a separate context&lt;/LI&gt;&lt;LI style="margin: 5px 0px;"&gt;AND potentially setup in an active/active cluster&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin: 5px 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.4px; line-height: normal;"&gt;Thank you&lt;/P&gt;&lt;P style="font-size: 14.4px; line-height: normal;"&gt;Frank&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767434#M178796</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2019-03-12T06:36:21Z</dc:date>
    </item>
    <item>
      <title>Hi,I think BGP with full</title>
      <link>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767435#M178797</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think BGP with full routing table is not officially supported but depends on the resources on the box so should work.&lt;/P&gt;&lt;P&gt;The only other thing is the Anyconnect support on Multiple Context is not supported but is in on roadmap for future version:- https://tools.cisco.com/bugsearch/bug/CSCsm17507/?reffering_site=dumpcr&lt;/P&gt;&lt;P&gt;And without Multiple context , you would not be able to use the Active/Active Failover.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 11:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767435#M178797</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-09-17T11:11:13Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor,Thank youFor</title>
      <link>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767436#M178798</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;For clarity -&amp;nbsp;I envision&amp;nbsp;this setup&amp;nbsp;like this -&amp;nbsp;the 6500 Sup720 with maximum DRAM would run&amp;nbsp;BGP to interface with the ISP and hold the full internet routing table. BGP would dynamically announce the Default-Network into OSPF and OSPF would announce our internal LANs to BGP.&amp;nbsp;OSPF would run&amp;nbsp;on each virtual context within the ASA SM. OSPF would support our internal LANs. BGP would not be needed on the ASA SM. - I think I stated this incorrectly in my original message.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you saying we WILL need to employ the ASA SM multi-context mode to support an active/active setup?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 16:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767436#M178798</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2015-09-17T16:39:54Z</dc:date>
    </item>
    <item>
      <title>Hi,Yes , For Active/Active</title>
      <link>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767437#M178799</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Yes , For Active/Active Failover , you need to be in Multiple Context.&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91336-pix-activeactive-config.html&lt;/P&gt;&lt;P&gt;Also , to be clear on the requirement:-&lt;/P&gt;&lt;P&gt;EIGRP is supported in multi-context mode. But EIGRP instances cannot form adjacency with each other across shared interfaces because inter-context exchange of multicast traffic is not supported. Yes, ASA will form neighbor ship with other peers.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 16:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767437#M178799</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-09-17T16:59:02Z</dc:date>
    </item>
    <item>
      <title> Hi Vibhor,This is how I</title>
      <link>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767438#M178800</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;This is how I envision this setup,&lt;/P&gt;&lt;P&gt;QUESTION: Does this seem correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Border 6500-1 peers with ISP&amp;nbsp;via BGP&lt;/LI&gt;&lt;LI&gt;Global Routing Table (&lt;EM&gt;GRT&lt;/EM&gt;) will hold&amp;nbsp;BGP prefixes (&lt;EM&gt;perhaps full internet routing table&lt;/EM&gt;)&lt;/LI&gt;&lt;LI&gt;From &lt;EM&gt;GRT&lt;/EM&gt;,&amp;nbsp;20 of our remote site BGP prefixes redistribute into OSPF.&lt;/LI&gt;&lt;LI&gt;DMZ virtual contexts,currently 12 DMZs&lt;UL&gt;&lt;LI&gt;#.#.0.0/24&lt;/LI&gt;&lt;LI&gt;#.#.1.0/24&lt;/LI&gt;&lt;LI&gt;#.#.2.0/24&lt;/LI&gt;&lt;LI&gt;#.#.3.0/24&lt;/LI&gt;&lt;LI&gt;etc.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;DMZ environments&amp;nbsp;are layer-2 only&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Virtual context 1 is the default-gateway for virtual context 1 nodes&lt;/LI&gt;&lt;LI&gt;Virtual context 2&amp;nbsp;is the default-gateway for&amp;nbsp;virtual context 2 nodes&lt;/LI&gt;&lt;LI&gt;Virtual context 3&amp;nbsp;is the default-gateway for&amp;nbsp;virtual context 3 nodes, etc.&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;OSPF dynamically&amp;nbsp;generates 0/0 and announces to internal net&lt;/LI&gt;&lt;LI&gt;OSPF announces each DMZ virtual context net to the internal network (&lt;EM&gt;optional&lt;/EM&gt;)&lt;/LI&gt;&lt;LI&gt;OSPF nets are also redistributed into BGP and announced to ISP&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;6500-1 and&amp;nbsp;6500-2 perform identical&amp;nbsp;functions&lt;/LI&gt;&lt;LI&gt;6500-1 and 6500-2 peer&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your assistance&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Sep 2015 14:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767438#M178800</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2015-09-19T14:26:34Z</dc:date>
    </item>
    <item>
      <title>Hi,I don't see any problem</title>
      <link>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767439#M178801</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I don't see any problem with this requirement.&lt;/P&gt;&lt;P&gt;I just wanted to make sure that you don't have any peering between the ASA contexts itself.&lt;BR /&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2015 00:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767439#M178801</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-09-20T00:17:12Z</dc:date>
    </item>
    <item>
      <title>Thank youFrank</title>
      <link>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767440#M178802</link>
      <description>&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2015 15:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/6500-with-asa-service-module-full-internet-routing-table-and/m-p/2767440#M178802</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2015-09-20T15:55:21Z</dc:date>
    </item>
  </channel>
</rss>

