<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,If you want to migrate the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/link-migration-to-new-isp-and-new-asas/m-p/2725549#M179258</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you want to migrate the servers one by one I can suggest to use policy based routing (if supported) on Core switch. You can change the default route for only particular server (source based) towards the NEW firewall. Before that you have to migrate all ACLs and NAT rules off course.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ergin&lt;/P&gt;</description>
    <pubDate>Thu, 15 Oct 2015 13:20:02 GMT</pubDate>
    <dc:creator>ealiev</dc:creator>
    <dc:date>2015-10-15T13:20:02Z</dc:date>
    <item>
      <title>Link Migration to New ISP and New ASAs.</title>
      <link>https://community.cisco.com/t5/network-security/link-migration-to-new-isp-and-new-asas/m-p/2725547#M179201</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance for taking the time to read. Security is not my strength and I need to know if this is even possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am migrating to a new ISP and New FWs, I setup the new link and firewalls parallel.&amp;nbsp;I already have the new ISP and new FWs configured and I have internet access. I thought I could change the default route on the core switch to point to the new FWs&amp;nbsp; and therefore to the new ISPs, however, when do this my servers are not responding to outside requests. Inside clients like computers can get online but my web servers are down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My plan was to use the new ISP for outbound and slowly migrate the servers to the new ISP block by changing the external DNS and NATTING through the new FWs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this scenario possible assuming the FWs are configured properly?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Topology:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NEW ISP &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;(IP block 209.x.x.x) ===&amp;gt; New ASA ==&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ==== core &amp;nbsp; &amp;nbsp; ===== clients&amp;nbsp;&lt;/P&gt;&lt;P&gt;OLD ISP &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;==== switch &amp;nbsp;=====and servers&lt;/P&gt;&lt;P&gt;(IP Block 63.x.x.x)====&amp;gt; OLD ASA ==&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NATs to&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Inside Servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FG&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/link-migration-to-new-isp-and-new-asas/m-p/2725547#M179201</guid>
      <dc:creator>Francisco Granados</dc:creator>
      <dc:date>2019-03-12T06:42:21Z</dc:date>
    </item>
    <item>
      <title>That plan should work. You</title>
      <link>https://community.cisco.com/t5/network-security/link-migration-to-new-isp-and-new-asas/m-p/2725548#M179238</link>
      <description>&lt;P&gt;That plan should work. You just need to be careful that you do not route any traffic from the servers out to the internet through the NEW firewall before the NAT and ACL rules have been migrated across. You may create an ASYMMETRIC routing scenario and State tables won't match, and traffic will be dropped.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2015 09:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/link-migration-to-new-isp-and-new-asas/m-p/2725548#M179238</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-10-07T09:53:02Z</dc:date>
    </item>
    <item>
      <title>Hi,If you want to migrate the</title>
      <link>https://community.cisco.com/t5/network-security/link-migration-to-new-isp-and-new-asas/m-p/2725549#M179258</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you want to migrate the servers one by one I can suggest to use policy based routing (if supported) on Core switch. You can change the default route for only particular server (source based) towards the NEW firewall. Before that you have to migrate all ACLs and NAT rules off course.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ergin&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 13:20:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/link-migration-to-new-isp-and-new-asas/m-p/2725549#M179258</guid>
      <dc:creator>ealiev</dc:creator>
      <dc:date>2015-10-15T13:20:02Z</dc:date>
    </item>
  </channel>
</rss>

