<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two isp's on the Cisco ASA and DMZ server access through internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176852#M360518</link>
    <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking your support on below configuration, please provide me correct solution. Actually we have two internet connections one is existing another one is new, but the new link will be main(active) while the old one will be standby (backup). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the dmz zone we have one application server, for the DMZ need be configuration on firewall and need full access from outside through internet. For more information please see the attached Network Design.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Two isp's on the Cisco ASA for redundancy:&lt;BR /&gt;========================================&lt;BR /&gt;* For the new internet link it is a new public IP which should be connected to the FW. &lt;BR /&gt;The old and new links should be there in the Firewall but the new link will be main(active) while the old one will be standby (backup).&lt;BR /&gt;!&lt;BR /&gt;Interface eth0&lt;BR /&gt;nameif outside (primary isp link-NEW)&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface eth1&lt;BR /&gt;nameif backup (this is another isp link-OLD)&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface eth2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-ledress 100&lt;BR /&gt;ip address X.X.X.249 255.255.252.0&lt;BR /&gt;!&lt;BR /&gt;* For the DMZ need a configuration for DMZ server for Application access from outside through internet&lt;BR /&gt;!&lt;BR /&gt;interface eth3&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-ledress 50&lt;BR /&gt;ip address X.X.X.200 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (backup) 1 interface&lt;BR /&gt;nat (inside) 1 X.X.X.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.1 1 track 1&lt;BR /&gt;!&lt;BR /&gt;route backup 0.0.0.0 0.0.0.0 X.X.X.1 254&lt;BR /&gt;!&lt;BR /&gt;sla monitor 123&lt;BR /&gt;type echo protocol ipIcmpEcho 10.0.0.1 interface outside&lt;BR /&gt;num-packets 3&lt;BR /&gt;frequency 10&lt;/P&gt;&lt;P&gt;(configure a new monitoring process with id 123, specify the monitoring&lt;BR /&gt;protocol &amp;amp; the target network object whose availability the tracking&lt;BR /&gt;process monitors. )&lt;BR /&gt;!&lt;BR /&gt;sla monitor schedule 123 life fireever start-time now&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 123 reachability&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:11:53 GMT</pubDate>
    <dc:creator>Mohammad Anowar Hossain Mazumder</dc:creator>
    <dc:date>2019-03-12T01:11:53Z</dc:date>
    <item>
      <title>Two isp's on the Cisco ASA and DMZ server access through internet</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176852#M360518</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking your support on below configuration, please provide me correct solution. Actually we have two internet connections one is existing another one is new, but the new link will be main(active) while the old one will be standby (backup). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the dmz zone we have one application server, for the DMZ need be configuration on firewall and need full access from outside through internet. For more information please see the attached Network Design.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Two isp's on the Cisco ASA for redundancy:&lt;BR /&gt;========================================&lt;BR /&gt;* For the new internet link it is a new public IP which should be connected to the FW. &lt;BR /&gt;The old and new links should be there in the Firewall but the new link will be main(active) while the old one will be standby (backup).&lt;BR /&gt;!&lt;BR /&gt;Interface eth0&lt;BR /&gt;nameif outside (primary isp link-NEW)&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface eth1&lt;BR /&gt;nameif backup (this is another isp link-OLD)&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface eth2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-ledress 100&lt;BR /&gt;ip address X.X.X.249 255.255.252.0&lt;BR /&gt;!&lt;BR /&gt;* For the DMZ need a configuration for DMZ server for Application access from outside through internet&lt;BR /&gt;!&lt;BR /&gt;interface eth3&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-ledress 50&lt;BR /&gt;ip address X.X.X.200 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (backup) 1 interface&lt;BR /&gt;nat (inside) 1 X.X.X.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.1 1 track 1&lt;BR /&gt;!&lt;BR /&gt;route backup 0.0.0.0 0.0.0.0 X.X.X.1 254&lt;BR /&gt;!&lt;BR /&gt;sla monitor 123&lt;BR /&gt;type echo protocol ipIcmpEcho 10.0.0.1 interface outside&lt;BR /&gt;num-packets 3&lt;BR /&gt;frequency 10&lt;/P&gt;&lt;P&gt;(configure a new monitoring process with id 123, specify the monitoring&lt;BR /&gt;protocol &amp;amp; the target network object whose availability the tracking&lt;BR /&gt;process monitors. )&lt;BR /&gt;!&lt;BR /&gt;sla monitor schedule 123 life fireever start-time now&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 123 reachability&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:11:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176852#M360518</guid>
      <dc:creator>Mohammad Anowar Hossain Mazumder</dc:creator>
      <dc:date>2019-03-12T01:11:53Z</dc:date>
    </item>
    <item>
      <title>Two isp's on the Cisco ASA and DMZ server access through interne</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176853#M360521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically you are adding a new ISP and want to use the DMZ server using the new link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recommend you to configure a similar nat configuration to the one you had for the old ISP, this time just using an IP address in the new range. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the configuration you posted the complete configuration? i don´t see any configuration that will let you access a DMZ server from the outside. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Mar 2013 00:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176853#M360521</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-10T00:19:21Z</dc:date>
    </item>
    <item>
      <title>Two isp's on the Cisco ASA and DMZ server access through interne</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176854#M360526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for support @ jocamare, actually i am trying to do.... kindly help me on this post any advice how to do....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Mar 2013 19:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176854#M360526</guid>
      <dc:creator>Mohammad Anowar Hossain Mazumder</dc:creator>
      <dc:date>2013-03-10T19:55:14Z</dc:date>
    </item>
    <item>
      <title>Two isp's on the Cisco ASA and DMZ server access through interne</title>
      <link>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176855#M360530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd love to help, but the configuration is not complete and i'm still unsure about the IP addressing scheme you want to use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clarify this for me and then i'll provide you with the configuration you need to apply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Mar 2013 20:47:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-isp-s-on-the-cisco-asa-and-dmz-server-access-through/m-p/2176855#M360530</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-10T20:47:40Z</dc:date>
    </item>
  </channel>
</rss>

