<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two Firewalls on 2 Different Location One connected LAN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680652#M193298</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We currently have to ASA 5500 on two different locations each connected to the Internet, One firewall is the primary gateway for internet bound traffic and configured with OSPF and a static route 0 0 to the Border Router and 1 metric. The LAN is interconnected in the two locations by Fiber. The Firewall on the Secondary Location currently does not route traffic and is used as standby in case if failure on primary location. The secondary firewall also runs OSPF with static route 0 0 and metric of 200.&lt;/P&gt;&lt;P&gt;I would like to route one of the VLANs traffic through the Secondary Firewall. this VLAN will be connected on one of the firewall interfaces. (please see attached).&lt;/P&gt;&lt;P&gt;I need help configuring this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you and best regads&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:20:49 GMT</pubDate>
    <dc:creator>Wajma_2</dc:creator>
    <dc:date>2019-03-12T06:20:49Z</dc:date>
    <item>
      <title>Two Firewalls on 2 Different Location One connected LAN</title>
      <link>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680652#M193298</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We currently have to ASA 5500 on two different locations each connected to the Internet, One firewall is the primary gateway for internet bound traffic and configured with OSPF and a static route 0 0 to the Border Router and 1 metric. The LAN is interconnected in the two locations by Fiber. The Firewall on the Secondary Location currently does not route traffic and is used as standby in case if failure on primary location. The secondary firewall also runs OSPF with static route 0 0 and metric of 200.&lt;/P&gt;&lt;P&gt;I would like to route one of the VLANs traffic through the Secondary Firewall. this VLAN will be connected on one of the firewall interfaces. (please see attached).&lt;/P&gt;&lt;P&gt;I need help configuring this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you and best regads&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680652#M193298</guid>
      <dc:creator>Wajma_2</dc:creator>
      <dc:date>2019-03-12T06:20:49Z</dc:date>
    </item>
    <item>
      <title>Hi,Could Policy Based Routing</title>
      <link>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680653#M193300</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Could Policy Based Routing be used?&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-0SY/configuration/guide/15_0_sy_swcg/policy_based_routing_pbr.html&lt;/P&gt;&lt;P&gt;You would have to specify an ACL matching the source subnet of that particular VLAN; define a route-map where you would match that traffic; set ip next-hop The IP address towards your secondary AS; apply the policy on the VLAN interface.&lt;/P&gt;&lt;P&gt;Router(config)#&amp;nbsp;&lt;B class="cBold"&gt;route-map&lt;/B&gt; &lt;EM class="cEmphasis"&gt;map-tag&lt;/EM&gt; &lt;B class="cBold"&gt;permit&lt;/B&gt;&lt;/P&gt;&lt;P&gt;Router(config-route-map)#&amp;nbsp;&lt;B class="cBold"&gt;match ip address &lt;/B&gt;{&lt;EM class="cEmphasis"&gt;access-list-number&lt;/EM&gt; | &lt;EM class="cEmphasis"&gt;name&lt;/EM&gt;}&lt;/P&gt;&lt;P&gt;Router(config-route-map)#&amp;nbsp;&lt;B class="cBold"&gt;set ip next-hop&lt;/B&gt; &lt;EM class="cEmphasis"&gt;ip-address&lt;/EM&gt; [... &lt;EM class="cEmphasis"&gt;ip-address&lt;/EM&gt;]&lt;/P&gt;&lt;P&gt;Router(config-route-map)#&amp;nbsp;&lt;B class="cBold"&gt;interface&lt;/B&gt; &lt;EM class="cEmphasis"&gt;interface-type interface-number&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Router(config-if)#&amp;nbsp;&lt;B class="cBold"&gt;ip policy route-map&lt;/B&gt; &lt;EM class="cEmphasis"&gt;map-tag &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM class="cEmphasis"&gt;Hope this helps,&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM class="cEmphasis"&gt;Traian&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2015 16:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680653#M193300</guid>
      <dc:creator>Traian Bratescu</dc:creator>
      <dc:date>2015-07-28T16:53:55Z</dc:date>
    </item>
    <item>
      <title>Thank you for the response on</title>
      <link>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680654#M193302</link>
      <description>&lt;P style="text-align: justify;"&gt;Thank you for the response on this, however apparently route-map is redistricted by license. I do not have the set ip next-hop option. Is there any other way to do this.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2015 21:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680654#M193302</guid>
      <dc:creator>Wajma_2</dc:creator>
      <dc:date>2015-07-28T21:45:51Z</dc:date>
    </item>
    <item>
      <title>Sorry for the late reply... I</title>
      <link>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680655#M193304</link>
      <description>&lt;P&gt;Sorry for the late reply... I can't think of any elegant solution. If this is a must and have no other means of doing it (upgrade, replace, etc) you could try to create a VRF for that specific VLAN and another interface towards your backup site an within that VRF point the default route...)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's not by far an "elegant" solution but at least it would work....&lt;/P&gt;&lt;P&gt;Traian&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2015 21:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-firewalls-on-2-different-location-one-connected-lan/m-p/2680655#M193304</guid>
      <dc:creator>Traian Bratescu</dc:creator>
      <dc:date>2015-08-02T21:32:23Z</dc:date>
    </item>
  </channel>
</rss>

