<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Two ISP connection in my ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3832958#M27590</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Sorry, my option was wrong as PBR on ASA 8.3.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 06 Apr 2019 08:44:29 GMT</pubDate>
    <dc:creator>Deepak Kumar</dc:creator>
    <dc:date>2019-04-06T08:44:29Z</dc:date>
    <item>
      <title>Two ISP connection in my ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3832702#M27588</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have 1 ASA 5510 version 8.3 with 4 interfaces. outside1, outside2, inside and DMZ. Both outside1 and outside2 interfaces connected to ISP1 and ISP2 respectively. And core switch connecting my ASA with all my internal users. My current provider is ISP1 and all working well serving 300 users to the internet. Nevertheles, there were new requirement from our decision maker to port in a new ISP provider ISP2 into our network. ISP2 comes with all their own routers. ISP2 purposes is only to serves a few subnets or application for our internal users from their cloud.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In ASA my default route to the internet is to ISP1 routers interface&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route outside1 0.0.0.0&amp;nbsp; 0.0.0.0 1.1.1.1 1&lt;/P&gt;&lt;P&gt;My questions is can I route my all my internal users to certain subnets/ip address to ISP2 clouds without interrupting my default route to the internet?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example I want to route my users to ISP2 for subnets 10.40.88.0/24 or ip addres 10.40.88.35/32&lt;/P&gt;&lt;P&gt;I have already route the subnets in cores switch and route in ASA but have no luck.&lt;/P&gt;&lt;P&gt;route outside2 10.40.88.0 255.255.255.0 2.2.2.2 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Really appreciate any comments or advises.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2019 02:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3832702#M27588</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2019-04-05T02:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP connection in my ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3832718#M27589</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What you want to achieve is called PBR and this is supported on version 9.4.x. However this version isn't supported on your asa 5510.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can try a workaround to this by playing with nat. Commands would look like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sysopt noproxyarp inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network HOST-ISP2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;host 10.40.88.35&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network ANY-ISP2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;nat (inside,outside-isp2) source dynamic &lt;SPAN&gt;HOST-ISP2&lt;/SPAN&gt;&amp;nbsp;interface destination static ANY-ISP2 any&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2019 04:00:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3832718#M27589</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-04-05T04:00:19Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP connection in my ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3832958#M27590</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Sorry, my option was wrong as PBR on ASA 8.3.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 08:44:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3832958#M27590</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-04-06T08:44:29Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP connection in my ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3833391#M27591</link>
      <description>PBR won't work on ASA5510 because version 9.4.x isn't available for this box.</description>
      <pubDate>Sat, 06 Apr 2019 05:47:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/3833391#M27591</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-04-06T05:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP connection in my ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/4189502#M1076169</link>
      <description>&lt;P&gt;Sorry to raise up this thread again. Regarding to my last year problem was still unresolved due to multiple ISP implementation was postponed for a certain reason. However it has been continued started this year. I would explain briefly about my problem statement.&lt;/P&gt;&lt;P&gt;My company has 1 unit of ASA 5510 ver 7.2. This ASA has been running fine with one existing ISP (fix IP) being connected for all users. We have 1 unit of core switch Cisco Catalyst connected to ASA to work for the routing. Recently my company subscribe new ASDL line and want to port into existing network and intend to provide for only certain (users, vlans or subnets). This ASDL line comes with modem and PPPOE authentication username and password. I have already configured the ASA to meet the requirement and perhaps multiple ISP can be used together but I it seems got a little bit issue where targeted subnets was unable to route to the ASDL line. I attached here with the summary diagram of my current setup and sanitized configuration of ASA. Really appreciate any comments on this. I have been looking forward to solve the issue for almost 3 weeks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="network multiple ISP.jpeg" style="width: 749px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/89349iFA1C939B3A598725/image-size/large?v=v2&amp;amp;px=999" role="button" title="network multiple ISP.jpeg" alt="network multiple ISP.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(3)&lt;BR /&gt;&lt;BR /&gt;name 172.31.0.0 All_Subnet&lt;BR /&gt;name 172.31.15.0 ADSL_Subnet&lt;BR /&gt;&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description *Metro-E*&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 200.100.10.34 255.255.255.224&lt;BR /&gt;ospf cost 10&lt;BR /&gt;&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description *LAN Gateway*&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.31.3.254 255.255.255.248&lt;BR /&gt;ospf cost 10&lt;BR /&gt;&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;description DMZ interface&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.31.2.1 255.255.255.224&lt;BR /&gt;ospf cost 10&lt;BR /&gt;&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;description *Unifi Gateway*&lt;BR /&gt;nameif Unifi&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group UNIFI&lt;BR /&gt;ip address pppoe setroute&lt;BR /&gt;&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ospf cost 10&lt;BR /&gt;management-only&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in_unifi extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside_access_in_unifi extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu Unifi 1492&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;global (Outside) 1 200.100.10.35-200.100.10.45 netmask 255.255.255.0&lt;BR /&gt;global (Inside) 1 200.100.10.42 netmask 255.255.255.0&lt;BR /&gt;global (Unifi) 2 interface&lt;BR /&gt;nat (Outside) 1 172.31.3.0 255.255.255.240 outside&lt;BR /&gt;nat (Inside) 2 ADSL_Subnet 255.255.255.0&lt;BR /&gt;nat (Inside) 1 All_Subnet 255.255.0.0 dns&lt;/P&gt;&lt;P&gt;static (Inside,Outside) 200.100.10.61 172.31.3.2 netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface Outside&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-group Inside_access_out out interface Inside&lt;BR /&gt;access-group DMZ_to_inside in interface DMZ&lt;BR /&gt;access-group outside_access_in_unifi in interface Unifi&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 200.100.10.33 1&lt;BR /&gt;route Inside All_Subnet 255.255.0.0 172.31.3.253 1&lt;/P&gt;&lt;P&gt;vpdn group UNIFI request dialout pppoe&lt;BR /&gt;vpdn group UNIFI localname abcd@unifi&lt;BR /&gt;vpdn group UNIFI ppp authentication pap&lt;BR /&gt;vpdn username abcd@unifi password *********&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect icmp&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2020 04:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/4189502#M1076169</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2020-11-27T04:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP connection in my ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/4189554#M1076170</link>
      <description>&lt;P&gt;HI &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/266744"&gt;@El Rondo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you intend to use the new ISP connection for only certain (users, vlans or subnets), then you'd normally use PBR...but your ASA 5510 does not support upgrading to 9.x which supports PBR. You'd have to replace your hardware.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2020 07:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/4189554#M1076170</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-11-27T07:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP connection in my ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/4189994#M1076203</link>
      <description>&lt;P&gt;Thanks Rob for the clarification. Its sound like I might propose upgrading ASA to the latest model to support PBR. I thought PBR only support on layer 3 switching but to meet company requirement I really need to think about it. Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Nov 2020 08:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/4189994#M1076203</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2020-11-28T08:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP connection in my ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/4286791#M1078171</link>
      <description>&lt;P&gt;Welcome back everyone. Finally I was successfully able to buy a new unit ASA 5525-X with version 9.8(2).&lt;BR /&gt;My intention is to provide dual internet (ISP) for our VLAN users. First ISP is connected to lease line with static public ip and second ISP is connected dialup with dynamic PPPoE.&lt;BR /&gt;&lt;BR /&gt;I had run 3 tests here to simulate the result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) First run to show that&amp;nbsp; ISP1 (lease line) connection is working for both vlan IT and WIFI.&lt;/P&gt;&lt;PRE&gt;interface GigabitEthernet0/0
nameif WAN
security-level 0
ip address 10.33.22.11 255.255.255.224
!
interface GigabitEthernet0/1
nameif LAN
security-level 100
ip address 172.16.4.253 255.255.254.0
!
object network IT
subnet 172.17.4.0 255.255.255.0
description IT Vlan

object network WIFI
subnet 172.17.7.0 255.255.255.0
description WIFI Vlan

mtu WAN 1500
mtu LAN 1500

object network IT
nat (LAN,WAN) dynamic 10.33.22.12
object network WIFI
nat (LAN,WAN) dynamic 10.33.22.13

route WAN 0.0.0.0 0.0.0.0 10.33.22.11 1&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Second run to demonstrate that ISP2 (PPPoE) is working for both vlan IT and WIFI&lt;/P&gt;&lt;PRE&gt;interface GigabitEthernet0/0
nameif WAN
security-level 0
ip address 10.33.22.11 255.255.255.224
!
interface GigabitEthernet0/1
nameif LAN
security-level 100
ip address 172.16.4.253 255.255.254.0
!
interface GigabitEthernet0/3
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3.1
description # connected to unifi modem fiberhome
vlan 500
nameif UNIFI
security-level 0
pppoe client vpdn group GROUP_UNIFI
ip address pppoe setroute
!
object network IT
subnet 172.17.4.0 255.255.255.0
description IT Vlan
!
object network WIFI
subnet 172.17.7.0 255.255.255.0
description WIFI Vlan
!
mtu WAN 1500
mtu LAN 1500
mtu UNIFI 1492
!
object network IT&lt;BR /&gt;nat (LAN,UNIFI) dynamic interface&lt;BR /&gt;object network WIFI
nat (LAN,UNIFI) dynamic interface&lt;BR /&gt;!
vpdn group GROUP_UNIFI request dialout pppoe
vpdn group GROUP_UNIFI localname abcd@unifibiz
vpdn group GROUP_UNIFI ppp authentication pap
vpdn username abcd@unifibiz password *****&lt;/PRE&gt;&lt;P&gt;3) On the third run I try to route both vlans to different ISPs. vlan IT to ISP1 (lease line) and vlan WIFI to ISP2 (pppoe). The result is vlan IT was routed to ISP1 and vlan WIFI will also routed to ISP1.&lt;/P&gt;&lt;PRE&gt;interface GigabitEthernet0/0
 nameif WAN
 security-level 0
 ip address 10.33.22.11 255.255.255.224 
!
interface GigabitEthernet0/1
 nameif LAN
 security-level 100
 ip address 172.16.4.253 255.255.254.0 
!
interface GigabitEthernet0/3
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/3.1
 description # connected to unifi modem fiberhome
 vlan 500
 nameif UNIFI
 security-level 0
 pppoe client vpdn group GROUP_UNIFI
 ip address pppoe setroute
!
object network IT
 subnet 172.17.4.0 255.255.255.0
 description IT Vlan
!
object network WIFI
 subnet 172.17.7.0 255.255.255.0
 description WIFI Vlan
!
mtu WAN 1500
mtu LAN 1500
mtu UNIFI 1492
!
object network WIFI
 nat (LAN,UNIFI) dynamic interface
!
object network LEVEL_4
 nat (LAN,WAN) dynamic 10.33.22.12
!
route WAN 0.0.0.0 0.0.0.0 10.33.22.10 1
!
vpdn group GROUP_UNIFI request dialout pppoe
vpdn group GROUP_UNIFI localname abcd@unifibiz
vpdn group GROUP_UNIFI ppp authentication pap
vpdn username abcd@unifibiz password ***** &lt;/PRE&gt;&lt;P&gt;I really appreciate how can I achieve to route multiple vlans to dual isp like the above case. I understand that normally PBR can be used to. From what i understand that pbr will route if there is a static ip for example (pppoe fix ip). But my case was quite different where pppoe dont have static ip, it only receive dynamic ip.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Feel free to throw any comment here, I will likely to try any solutions and give feedback.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2021 15:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-connection-in-my-asa/m-p/4286791#M1078171</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2021-02-05T15:05:23Z</dc:date>
    </item>
  </channel>
</rss>

