<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple outside interface on Cisco ASA5512 version 9.5(1) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4023843#M22805</link>
    <description>&lt;P&gt;Hi, I would need some assistance on how to configure 2 outside interface. Each ISP (outside) interface have /28 IP Address and the other one is /30 IP Address. My intention is to put the servers behind the FW so each ISP is related to one of the inside (server) interface so it's not failover connection for the outside interface. PFA network diagram for better understanding. Each server needs to access bidirectional connections like the Internet, RDP and block some ports. There's 1 server does have a dedicated public IP /30 I need to connect to FW to set some limitation on the ports. I'm trying to simulate it using our spare&amp;nbsp;ASA5512 but I'm having a hard time to make it work. I don't know if it's doable or not. Please advise. thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside &lt;STRONG&gt;&amp;lt;---- (ISP 1)&lt;/STRONG&gt;&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside-2&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.0.0.1 255.255.240.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif outside-1 &lt;STRONG&gt;&amp;lt;--- (ISP 2)&lt;/STRONG&gt;&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;nameif inside-3&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Server-1&lt;BR /&gt;host 10.0.0.2&lt;BR /&gt;object network Server-2&lt;BR /&gt;host 172.168.1.15&lt;BR /&gt;access-list OUT_IN extended permit tcp any host 10.0.0.2 eq www&lt;BR /&gt;access-list OUT_IN extended permit tcp any host 10.0.0.2 eq 3389&lt;BR /&gt;access-list OUT_IN extended deny icmp any any echo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Server-1&lt;BR /&gt;nat (inside-2,outside) static x.x.x.x &lt;STRONG&gt;&amp;lt;---- Next available public IP for /28&lt;/STRONG&gt;&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 &lt;STRONG&gt;(Facing to ISP 1 Interface)&lt;/STRONG&gt; 1&lt;/P&gt;</description>
    <pubDate>Wed, 05 Feb 2020 07:05:50 GMT</pubDate>
    <dc:creator>johnbloods</dc:creator>
    <dc:date>2020-02-05T07:05:50Z</dc:date>
    <item>
      <title>Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4023843#M22805</link>
      <description>&lt;P&gt;Hi, I would need some assistance on how to configure 2 outside interface. Each ISP (outside) interface have /28 IP Address and the other one is /30 IP Address. My intention is to put the servers behind the FW so each ISP is related to one of the inside (server) interface so it's not failover connection for the outside interface. PFA network diagram for better understanding. Each server needs to access bidirectional connections like the Internet, RDP and block some ports. There's 1 server does have a dedicated public IP /30 I need to connect to FW to set some limitation on the ports. I'm trying to simulate it using our spare&amp;nbsp;ASA5512 but I'm having a hard time to make it work. I don't know if it's doable or not. Please advise. thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside &lt;STRONG&gt;&amp;lt;---- (ISP 1)&lt;/STRONG&gt;&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside-2&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.0.0.1 255.255.240.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif outside-1 &lt;STRONG&gt;&amp;lt;--- (ISP 2)&lt;/STRONG&gt;&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;nameif inside-3&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Server-1&lt;BR /&gt;host 10.0.0.2&lt;BR /&gt;object network Server-2&lt;BR /&gt;host 172.168.1.15&lt;BR /&gt;access-list OUT_IN extended permit tcp any host 10.0.0.2 eq www&lt;BR /&gt;access-list OUT_IN extended permit tcp any host 10.0.0.2 eq 3389&lt;BR /&gt;access-list OUT_IN extended deny icmp any any echo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Server-1&lt;BR /&gt;nat (inside-2,outside) static x.x.x.x &lt;STRONG&gt;&amp;lt;---- Next available public IP for /28&lt;/STRONG&gt;&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 &lt;STRONG&gt;(Facing to ISP 1 Interface)&lt;/STRONG&gt; 1&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 07:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4023843#M22805</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-05T07:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4023905#M22806</link>
      <description>&lt;P&gt;Yes that will work and the config looks fine for reaching the server-1 over outside. What is not working? What is the result of&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;packet-tracer input outside tcp 1.2.3.4 1234 PUBLIC-IP-OF-SERVER-1 80&lt;/PRE&gt;
&lt;P&gt;If it does not work it could be the result of config you are not showing here, especially other NAT-statements before the shown statements.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 09:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4023905#M22806</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-02-05T09:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4024432#M22807</link>
      <description>&lt;P&gt;On the NAT statement for interface outside-1 do you have the keyword "route-lookup" configured? if so remove it. Also, make sure that the NAT configuration is correct and that it actually does match the traffic for outside-1 interface.&amp;nbsp; If if route-lookup is not present and traffic flow still does not work, it is possible you will need to use policy base routing to redirect traffic out outside-1 interface.&amp;nbsp; For this you would need to upgrade to 9.7 or higher.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 20:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4024432#M22807</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-02-05T20:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4024624#M22808</link>
      <description>&lt;P&gt;Hi Marius, I don't have route-lookup command in my config. Server-1 is working properly can route from inside to outside or vice versa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My only concern is how to set up the second ISP 2 (outside-2) for inside-3 to have an internet connection because ISP 2 is only /30 there's no available IP address to point the private IP to another public IP like what I did on the Server-1 setup and I need to be able to RDP/SSH so on from the outside network to inside. Do I need to create an object network/service for the Server-2 and how will you create the natting and Access-List for that&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestion. thank you&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 03:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4024624#M22808</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-06T03:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4024625#M22809</link>
      <description>&lt;P&gt;Hi Karsten,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My only concern is how to set up the second ISP 2 (outside-2) for inside-3 to have an internet connection because ISP 2 is only /30 there's no available IP address to point the private IP to another public IP like what I did on the Server-1 setup and I need to be able to RDP/SSH so on from the outside network to inside. Do I need to create an object network/service for the Server-2 and how will you create the natting and Access-List for that&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestion. thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 03:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4024625#M22809</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-06T03:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4025456#M22810</link>
      <description>&lt;P&gt;Hi I tried the below commands. But it didn't work for the Server-2 to access from outside to inside via RDP but the internet is working fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet0/2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif outside-1&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;lt;--- (ISP 2)&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address x.x.x.x 255.255.255.252&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet0/3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif inside-3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 172.16.1.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Server-2&lt;BR /&gt;host 172.16.1.15&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;&lt;BR /&gt;object service Server-3389&lt;BR /&gt;service tcp source eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Server-2 interface service Server-80 Server-80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group OUT_IN in interface outside-1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 192.168.1.1 1234 172.16.1.15 3389&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.1.15 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 5&lt;/STRONG&gt;&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;STRONG&gt;rpf-check&lt;/STRONG&gt;&lt;BR /&gt;Result: &lt;STRONG&gt;DROP&lt;/STRONG&gt;&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static TerareconServer interface service Server-3389 Server-3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: &lt;STRONG&gt;drop&lt;/STRONG&gt;&lt;BR /&gt;Drop-reason: &lt;STRONG&gt;(acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 07:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4025456#M22810</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-07T07:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4025459#M22811</link>
      <description>&lt;P&gt;Hi I tried the below commands. But it didn't work for the Server-2 to access from outside to inside via RDP but the internet is working fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet0/2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif outside-1&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;lt;--- (ISP 2)&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address x.x.x.x 255.255.255.252&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet0/3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif inside-3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 172.16.1.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Server-2&lt;BR /&gt;host 172.16.1.15&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;&lt;BR /&gt;object service Server-3389&lt;BR /&gt;service tcp source eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Server-2 interface service Server-3389 Server-3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group OUT_IN in interface outside-1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 192.168.1.1 1234 172.16.1.15 3389&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.1.15 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 5&lt;/STRONG&gt;&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;STRONG&gt;rpf-check&lt;/STRONG&gt;&lt;BR /&gt;Result: &lt;STRONG&gt;DROP&lt;/STRONG&gt;&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static TerareconServer interface service Server-3389 Server-3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: &lt;STRONG&gt;drop&lt;/STRONG&gt;&lt;BR /&gt;Drop-reason: &lt;STRONG&gt;(acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 07:57:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4025459#M22811</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-07T07:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4025488#M22812</link>
      <description>&lt;P&gt;You have to use the public IP as the destination in packet-tracer.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 08:31:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4025488#M22812</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-02-07T08:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4026498#M22813</link>
      <description>&lt;P&gt;You will need to use a static NAT statement for server-2 pointing out the ISP-2, and it is possible you will need to use policy based routing (PBR) to route traffic out the ISP-2 interface in the case that the NAT statement doesn’t take care of that for you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2020 20:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4026498#M22813</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-02-09T20:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4026853#M22814</link>
      <description>&lt;P&gt;I think, You are able to configure ISP-1 with NAT, ACL and Route. You are facing issue in setting up server for the ISP-2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For that you have to configure PBR and also configure NAT with selective services. Find the configuration below for your reference.&amp;nbsp;&lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;DIV&gt;interface GigabitEthernet0/0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nameif outside&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;security-level 0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address 1.1.1.2 255.255.255.240&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nameif inside-2&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;security-level 100&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address 10.0.0.1 255.255.240.0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/2&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nameif outside-3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;security-level 0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address 2.2.2.2 255.255.255.252&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nameif inside-3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;security-level 100&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address 172.16.1.1 255.255.255.0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;policy-route route-map PBR &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;===== Policy based routing configure for traffic going out ======&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;object network SRV-1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;host 10.0.0.2&lt;/DIV&gt;&lt;DIV&gt;object network SRV-2&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;host 172.16.1.15&lt;/DIV&gt;&lt;DIV&gt;object network ISP-1-SRV-IP&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;host 1.1.1.3&lt;/DIV&gt;&lt;DIV&gt;object network ISP-2-SRV-IP&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;host 2.2.2.2&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;#### I have loosely configure ACL, you can separate the two #####&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;access-list OUT_IN extended permit tcp any object SRV-1 eq www&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;access-list OUT_IN extended permit tcp any object SRV-1 eq 3389&lt;/DIV&gt;&lt;DIV&gt;access-list OUT_IN extended permit tcp any object SRV-2 eq www&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;access-list OUT_IN extended permit tcp any object SRV-2 eq 3389&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#### ACL for Policy based routing traffic matching, I am matching subnet ###&lt;/DIV&gt;&lt;DIV&gt;access-list PBR extended permit ip 172.16.1.0 255.255.255.0 any&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;nat (inside-2,outside) source static SRV-1 ISP-1-SRV-IP &amp;nbsp; &amp;nbsp;(For Port Forwarding server -1 )&lt;/DIV&gt;&lt;DIV&gt;nat (inside-2,outside) source dynamic any interface &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ( For internet or Inside to Outside for server -1)&lt;/DIV&gt;&lt;DIV&gt;nat (inside-3,outside-3) source dynamic any interface ( For internet or Inside to Outside for server -2)&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;object network SRV-2&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (inside-3,outside-3) static interface service tcp www www &amp;nbsp; (For port forwarding server -2)&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;access-group OUT_IN in interface outside&lt;/DIV&gt;&lt;DIV&gt;access-group OUT_IN in interface outside-3&lt;/DIV&gt;&lt;DIV&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;route-map PBR permit 10&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match ip address PBR&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;set ip next-hop 2.2.2.1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/DIV&gt;&lt;DIV&gt;route outside-3 0.0.0.0 0.0.0.0 2.2.2.1 10&lt;/DIV&gt;&lt;P&gt;=======&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is not really fine structure configuration. But you will get the idea and if you still having issue. Do let me know.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;H2H&lt;/P&gt;&lt;P&gt;### RATE ALL HELPFUL RESPONSES ###&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 14:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4026853#M22814</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2020-02-10T14:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4027973#M22815</link>
      <description>&lt;P&gt;Here is my config below after you suggest to put the PBR configuration. does it mean it's working now since I tested the packet-tracer the result is allowed? What I did was the Server-2 is my laptop for simulation and then connected to ASA (interface G0/1) for the inside.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.97 255.255.255.0 &lt;STRONG&gt;&amp;lt;--- this IP is configured to our load balancer in our Office.&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;policy-route route-map PBR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Server-2&lt;BR /&gt;host 172.16.1.15&lt;BR /&gt;object network ISP-2-SRV-IP&lt;BR /&gt;host 192.168.1.97&lt;BR /&gt;&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2&lt;SPAN&gt;&amp;nbsp; eq ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq www&lt;BR /&gt;access-list PBR extended permit ip 172.16.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (outside,inside) source dynamic any interface&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network Server-2&lt;BR /&gt;nat (inside,outside) static interface service tcp www www&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;!&lt;BR /&gt;route-map PBR permit 10&lt;BR /&gt;match ip address PBR&lt;BR /&gt;set ip next-hop 192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA2(config)# packet-tracer input outside tcp 192.168.1.25 13389 172.16.1.15 3389&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.1.15 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.1.25/13389 to 172.16.1.1/13389&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 156588, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-interface: outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: allow&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 06:27:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4027973#M22815</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-12T06:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4027984#M22816</link>
      <description>&lt;P&gt;I tried to change the NAT config because it's not pointing to my Server-2 IP address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From&lt;/P&gt;&lt;P&gt;nat (outside,inside) source dynamic any interface&lt;/P&gt;&lt;P&gt;To&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any TerareconServer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA2(config)# packet-tracer input outside tcp x.x.x.x 13389 172.16.1.15 3389&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.1.15 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside) source static any Server-2&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate x.x.x.x/13389 to 172.16.1.15/13389&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Frame drop:&lt;BR /&gt;Invalid encapsulation (invalid-encap) 2961&lt;BR /&gt;No valid adjacency (no-adjacency) 191&lt;BR /&gt;No route to host (no-route) 19&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 999615&lt;BR /&gt;First TCP packet not SYN (tcp-not-syn) 1460&lt;BR /&gt;TCP failed 3 way handshake (tcp-3whs-failed) 123&lt;BR /&gt;TCP RST/FIN out of order (tcp-rstfin-ooo) 5994&lt;BR /&gt;TCP SYNACK on established conn (tcp-synack-ooo) 21&lt;BR /&gt;TCP RST/SYN in window (tcp-rst-syn-in-win) 7&lt;BR /&gt;Slowpath security checks failed (sp-security-failed) 873988&lt;BR /&gt;Expired flow (flow-expired) 1&lt;BR /&gt;FP L2 rule drop (l2_acl) 173708&lt;BR /&gt;Interface is down (interface-down) 168&lt;BR /&gt;Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool) 927&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;&lt;P&gt;Flow drop:&lt;BR /&gt;NAT reverse path failed (nat-rpf-failed) 228&lt;BR /&gt;Inspection failure (inspect-fail) 10&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 07:12:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4027984#M22816</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-12T07:12:03Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4028125#M22817</link>
      <description>You have not configured NAT rules properly. Can you just check the rules from my example.&lt;BR /&gt;There are Four NAT rules.&lt;BR /&gt;&lt;BR /&gt;1: To allow internet from 10.0.0.0/20 subnet including Server 10.0.0.2 from OUTSIDE (ISP-1)&lt;BR /&gt;nat (inside-2,outside) source dynamic any interface&lt;BR /&gt;2: To host WWW and RDP service on Server 10.0.0.2 from OUTSIDE IP address (ISP-1)&lt;BR /&gt;nat (inside-2,outside) source static SRV-1 ISP-1-SRV-IP&lt;BR /&gt;3: To allow Internet from 172.16.1.0/24 subnet including Server 172.16.1.15 from OUTSIDE-3 (ISP-2)&lt;BR /&gt;nat (inside-3,outside-3) source dynamic any interface&lt;BR /&gt;4: To host WWW service on Server 172.16.1.15 from OUTSIDE-3 Interface IP address (ISP-2)&lt;BR /&gt;object network SRV-2&lt;BR /&gt;nat (inside-3,outside-3) static interface service tcp www www (If you need more services you can&lt;BR /&gt;create service object and service group)&lt;BR /&gt;&lt;BR /&gt;Your configuration does not reflect the same. You can run the sh nat details command for more detail. Your PBR seems to be fine and I hope you have not missed on the floating default route to secondary ISP.&lt;BR /&gt;&lt;BR /&gt;If you still having problem do let me know, I am always ready to help you.&lt;BR /&gt;&lt;BR /&gt;H2H&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Wed, 12 Feb 2020 11:45:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4028125#M22817</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2020-02-12T11:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4028832#M22818</link>
      <description>&lt;P&gt;Hi I'm still having an issue with the Server-2 to have internet / RDP for allowing from outside to inside or vise versa. Below is my current commands on ASA. Is there any command for NAT/ACL that can work on both Internet/RDP is working&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just disregard the PBR command, for now, I just wanna work on this kind of setup&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.252 &lt;STRONG&gt;&amp;lt;---- /30 ISP&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Server-2&lt;BR /&gt;host 172.16.1.15&lt;BR /&gt;nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network ISP-2-SRV-IP&lt;BR /&gt;host 192.168.1.97&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object service TCP3389&lt;BR /&gt;service tcp source eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface &lt;STRONG&gt;&amp;lt;-- If this command is configured my Server-2 is able to browse but cannot RDP from outside to inside and the packet-tracer results will be drop&lt;/STRONG&gt;&lt;BR /&gt;nat (outside,inside) source static any any destination static interface Server-2 service TCP3389 TCP3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list OUT_IN extended permit tcp any object Server-2 eq www&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group OUT_IN in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;packet-tracer input outside tcp x.x.x.x 12345 172.16.1.15 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.1.15 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;access-list OUT_IN extended permit tcp any object Server-2 eq 3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic any interface&lt;/STRONG&gt;&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-interface: outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 08:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4028832#M22818</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-13T08:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4028859#M22819</link>
      <description>Do you ASA Gig 0/0 (OUTSIDE) interface has public IP address? As per your information "192.168.1.97" is not a public IP address. Can you provide Network Diagram to understand it better.&lt;BR /&gt;Whenever you user packet tracer use the public IP address not the NATed IP.&lt;BR /&gt;For example:&lt;BR /&gt;My ASAs outside interface ip is 1.1.1.1 and want to see if 3389 is allowed from outside on this i would use.&lt;BR /&gt;&lt;BR /&gt;packet-tracer input outside tcp 2.2.2.2 12345 1.1.1.1 3389&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;"nat (inside,outside) source dynamic any interface &amp;lt;-- If this command is configured my Server-2 is able to browse but cannot RDP from outside to inside and the packet-tracer results will be drop"&lt;BR /&gt;&lt;BR /&gt;This is normal configuration to allow internet access.&lt;BR /&gt;&lt;BR /&gt;If you are available online I can help you remotely.&lt;BR /&gt;&lt;BR /&gt;H2H&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Feb 2020 09:18:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4028859#M22819</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2020-02-13T09:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4029633#M22820</link>
      <description>&lt;P&gt;Hi, the Internet is working fine based on the configuration you suggested that is shown on the network diagram (attached) but the only concern is what is the correct configuration on ACL, NAT, Network Object/Service to be able outside network to access the inside network (server-2) to permit it like SSH, Telnet, RDP and so on and to deny some ports.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2020 08:03:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4029633#M22820</guid>
      <dc:creator>johnbloods</dc:creator>
      <dc:date>2020-02-14T08:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple outside interface on Cisco ASA5512 version 9.5(1)</title>
      <link>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4029660#M22821</link>
      <description>First of all, According to your diagram image the IP address configured on the interface Gig 0/0 (OUTSIDE) is wrong.&amp;nbsp;199.98.9.12 255.255.255.252 is a network ID and usable IP address are 199.98.9.13 and 199.98.9.14. On the other hand the default gateway you configured 199.98.9.11 which is outside this IP range and Broadcast IP for the earlier subnet 199.98.9.8/30 so not usable.&lt;BR /&gt;&lt;BR /&gt;I would suggest you to first resolve/clear this IP configuration issues.&lt;BR /&gt;&lt;BR /&gt;The NAT is configured to NAT WWW traffic only.&lt;BR /&gt;The ACL is configured to allow WWW and RDP traffic.&lt;BR /&gt;The given configuration is correct to allow WWW services to forward on the 172.16.1.15 (subject to rectified IP configuration. )&lt;BR /&gt;If you want to allow more services you can create multiple NAT rules and update the ACL accordingly.&lt;BR /&gt;&lt;BR /&gt;Still having issue, PM me I will help you online remotely.&lt;BR /&gt;&lt;BR /&gt;H2H&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Fri, 14 Feb 2020 08:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-outside-interface-on-cisco-asa5512-version-9-5-1/m-p/4029660#M22821</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2020-02-14T08:36:12Z</dc:date>
    </item>
  </channel>
</rss>

