<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, I think you might need to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526066#M236046</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you might need to clarify the situation a bit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I understood you are saying that you have the basic internal and external interfaces on the ASA and also a link to a MPLS network where possinly some remote sites are located?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure what you are asking of us though? I do see that you have only configured a default route on the ASA. Naturally if there are some remote sites between one of the interfaces you should have static routes configured for those networks pointing to the correct interface and correct gateway IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For traffic between your LAN and MPLS networks will go without NAT by default so you dont have to worry about that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your MPLS networks require NAT towards the External networks then you can do a similiar NAT configuration for it like you have for your LAN at the moment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your current interface naming is kinda confusing. It seems that the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; holds the default route while the "internet" does not have any routes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as I said can you please clarify your requirements for the setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 01 Aug 2014 06:43:47 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-08-01T06:43:47Z</dc:date>
    <item>
      <title>multiple connection asa</title>
      <link>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526065#M236045</link>
      <description>&lt;P&gt;I need to connect 1 interface to mpls not nat-ed (Vlan2) and 1 connection to internet nat-ed (Vlan3).&amp;nbsp; So all traffic out vlan 3 except for private network over mpls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.0(3)&lt;BR /&gt;!&lt;BR /&gt;hostname X.X.X.X&lt;BR /&gt;domain-name X.X.X.X&lt;BR /&gt;enable password XXXXXXXX encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd X.X.X.X XXXXXXXXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 1.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 2.2.2.2 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;&amp;nbsp;nameif internet&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 3.3.3.3 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa903-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name XXXXXX&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu internet 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-721.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,internet) source dynamic any interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http X.X.X.X 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 255.255.255.255 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 internet&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh X.X.X.X 255.255.255.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 internet&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username admin password XXXXXXX/ encrypted&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:075862af675d99e7166b8165ac099879&lt;BR /&gt;: end&lt;BR /&gt;ASA#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526065#M236045</guid>
      <dc:creator>gregrain1</dc:creator>
      <dc:date>2019-03-12T04:33:44Z</dc:date>
    </item>
    <item>
      <title>Hi, I think you might need to</title>
      <link>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526066#M236046</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you might need to clarify the situation a bit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I understood you are saying that you have the basic internal and external interfaces on the ASA and also a link to a MPLS network where possinly some remote sites are located?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure what you are asking of us though? I do see that you have only configured a default route on the ASA. Naturally if there are some remote sites between one of the interfaces you should have static routes configured for those networks pointing to the correct interface and correct gateway IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For traffic between your LAN and MPLS networks will go without NAT by default so you dont have to worry about that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your MPLS networks require NAT towards the External networks then you can do a similiar NAT configuration for it like you have for your LAN at the moment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your current interface naming is kinda confusing. It seems that the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; holds the default route while the "internet" does not have any routes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as I said can you please clarify your requirements for the setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Aug 2014 06:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526066#M236046</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-08-01T06:43:47Z</dc:date>
    </item>
    <item>
      <title>I tried doing the route</title>
      <link>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526067#M236047</link>
      <description>&lt;P&gt;I tried doing the route statments but when I do I lose connectivity to the firewall.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Aug 2014 12:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526067#M236047</guid>
      <dc:creator>gregrain1</dc:creator>
      <dc:date>2014-08-01T12:13:18Z</dc:date>
    </item>
    <item>
      <title>Hi, I am not sure what</title>
      <link>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526068#M236049</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure what changes you made so I can't really say anything. If you changed the default route to point somewhere else then that is probably the reason why you lost connectivity to the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would really need to know exactly what you are attempting to do and what the interfaces are used for. You have interfaces &lt;STRONG&gt;"outside"&lt;/STRONG&gt; and &lt;STRONG&gt;"internet"&lt;/STRONG&gt; which both to me hint about an interface directly connected to the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the other interface has a connection to some remote networks then that interface needs routes for specific networks only. The interface which is supposed to be used for Internet traffic needs to have the default route.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Aug 2014 15:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526068#M236049</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-08-01T15:11:25Z</dc:date>
    </item>
    <item>
      <title>Ok lets see if this helps,</title>
      <link>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526069#M236051</link>
      <description>&lt;P&gt;Ok lets see if this helps, the ASA was the connection from a remote site through an MPLS connection back to the DataCenter. &amp;nbsp;The MPLS connection was not fast enough to handle internal traffic plus internet traffic, so they installed a circuit for internet. &amp;nbsp;The outside connection is for the MPLS traffic to the DC, the Internet connection is for internet only, so I need internal LAN traffic go across the outside interface and all other traffic go across the internet interface. &amp;nbsp;I did a route outside 0 0 3.3.3.3 and route for 2.2.2.2/24 to go to the outside interface but when I do that I can't connect back to the ASA. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Aug 2014 14:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526069#M236051</guid>
      <dc:creator>gregrain1</dc:creator>
      <dc:date>2014-08-02T14:43:43Z</dc:date>
    </item>
    <item>
      <title>Was able to get this fixed.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526070#M236052</link>
      <description>&lt;P&gt;Was able to get this fixed. &amp;nbsp;I changed the quad 0 route to route to vlan3. &amp;nbsp;Remoted to a pc on the local LAN and was able to make the change.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2014 23:54:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-connection-asa/m-p/2526070#M236052</guid>
      <dc:creator>gregrain1</dc:creator>
      <dc:date>2014-08-06T23:54:36Z</dc:date>
    </item>
  </channel>
</rss>

