<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix firewall with 3 wan connection ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525416#M501199</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure it will work, except the fact that you cannot maximize the 3 links for your internet browsing or accessing external network activities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet access will go mainly via Link#1 as it has highest metric or priority. The other 2 links will probably do nothing until Link#1 down. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***But again, there might be an issue as PIX will not know/aware (not intelligence) if Link#1 is down. This will make it to keep pushing/sending traffic out through that link. That's why a router is needed. But you can always use Link#2 &amp;amp; Link#3 for for specific traffic, e.g use Link#2 for email traffic, Link#3 for DNS and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively, if you want, you can try this (attach config) theory, although this is still subjected to the above *** statement. The execption is each internal address/subnet will use specific link to go out/to internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For PIX OS, if possible, use the latest 6.x version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 May 2006 10:53:57 GMT</pubDate>
    <dc:creator>a.kiprawih</dc:creator>
    <dc:date>2006-05-23T10:53:57Z</dc:date>
    <item>
      <title>Pix firewall with 3 wan connection ?</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525411#M501194</link>
      <description>&lt;P&gt;We have 3 dsl line of 2 mbps each with public ip assigned. I want to go for PIX firewall, Can i use all 3 wan connection simutaneously with PIX firewall, if yes then how. Any alternate thr?. also guide me cheapest pix version to use as firewall with all 3 wan connection.&lt;/P&gt;&lt;P&gt;Thanx in advance&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:55:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525411#M501194</guid>
      <dc:creator>blue4cisco</dc:creator>
      <dc:date>2020-02-21T08:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: Pix firewall with 3 wan connection ?</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525412#M501195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3 links to ISP is fine, as long as you have enough ports on PIX to host those DSLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to get at least PIX515E with 4 interfaces (3 for DSLs, 1 for internal network). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default, it comes with 2 interfaces (inside-Eth1 &amp;amp; outside-Eth0).  When you place an order, you can either add *two (2) additional FastEthernet cards or get **1 x 4-Ports FastEthernet card.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default, PIX515E support max 3 interface with Restricted (R) license. For 4 or more interfaces, you need to get PIX with UnRestricted (UR) software license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*PIX-1FE : PIX single-port 10/100 Fast Ethernet interface card&lt;/P&gt;&lt;P&gt;**PIX-4FE-66 : PIX 64-bit/66-MHz x 4-port 10/100 Fast Ethernet interface card, RJ45&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_data_sheet09186a0080091b15.html" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_data_sheet09186a0080091b15.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can control connectivity/traffic from internal network/user to use any of those DSLs via NAT, Global, static nat, ACL and route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration Guide:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172786.html" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172786.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 May 2006 06:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525412#M501195</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-05-23T06:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: Pix firewall with 3 wan connection ?</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525413#M501196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is it possible with pix firewall that i plug three different network in 3 ports &amp;amp; Lan user can access any network they wish to ? plz. open attachement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 May 2006 06:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525413#M501196</guid>
      <dc:creator>blue4cisco</dc:creator>
      <dc:date>2006-05-23T06:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: Pix firewall with 3 wan connection ?</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525414#M501197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your design looks simple, but need careful configuration.&lt;/P&gt;&lt;P&gt;You can use NAT &amp;amp; Global command to allow outbound connect, and ACL to restrict outbound access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172790.html#wp1008082" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172790.html#wp1008082&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;Nat (inside) 1 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;Global (dsl_line) 1 x.x.x.10-x.x.x.20 netmask 255.255.255.128&lt;/P&gt;&lt;P&gt;Global (net1) 1 y.y.y.40-x.x.x.50 netmask 255.255.255.192&lt;/P&gt;&lt;P&gt;Global (net2) 1 z.z.z.20-z.z.z.30 netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.1 1* &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 y.y.y.1 2*&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 z.z.z.1 3*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note:&lt;/P&gt;&lt;P&gt;*PIX only accept one (1) static route with metric 1 at any time. Therefore, you need to assign priority, e.g link #1 metric 1, link 2 mteric 2 and so on, to the default route to all 3 links. PIX does not have smart routing feature like router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727ab.html#wp1027614" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727ab.html#wp1027614&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But since all your internal hosts are connected directly to PIX inside interface, and need to use all 3 links to go out anywhere they want, users need to add 3 gateways in their machines, which is not really recommended due to problem with Microsoft. You can always add 2 more IPs as gateway, but host will keep looking/using the 1st gateway in the list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cannot use &amp;#145;route-map&amp;#146; in PIX as it is used to redistribute routes from one routing protocol into another, not to specify preferred route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You probably need to specify specific range of target/external addresses/subnets in the static route to enable internal hosts accessing specific external/internet address via specific link. In this case, you don&amp;#146;t need to specify the metric.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;route outside 198.133.x.x.255.255.255 x.x.x.1 --&amp;gt; accessing &lt;A class="jive-link-custom" href="http://www.cisco.com" target="_blank"&gt;http://www.cisco.com&lt;/A&gt; via  link #1&lt;/P&gt;&lt;P&gt;route outside 66.102.x.x.255.255.255 y.y.y.1 --&amp;gt; accessing &lt;A class="jive-link-custom" href="http://www.google.com" target="_blank"&gt;http://www.google.com&lt;/A&gt; via  link #2&lt;/P&gt;&lt;P&gt;route outside 202.71.108.28  255.255.255.255 z.z.z.1 --&amp;gt; accessing &lt;A class="jive-link-custom" href="http://www.cari.com.my" target="_blank"&gt;http://www.cari.com.my&lt;/A&gt; via  link #3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the best option is to put Router in front of firewall, and use &amp;#145;route-map&amp;#146; feature in router to define which traffic goes to which link. All 3 links need to be hooked to this router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 May 2006 08:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525414#M501197</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-05-23T08:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Pix firewall with 3 wan connection ?</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525415#M501198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx AK, u r very close to my solution. let me tell u that we r using win98 at end user would it be ok to access all 3 network with 98 using 3 gateways. my network are 23.125.12.* , 192.168.2.*, 78.561.25.*.With out a router can we implement this using PIX only. would it work ?&lt;/P&gt;&lt;P&gt;Waiting ur reply&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 May 2006 09:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525415#M501198</guid>
      <dc:creator>blue4cisco</dc:creator>
      <dc:date>2006-05-23T09:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Pix firewall with 3 wan connection ?</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525416#M501199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure it will work, except the fact that you cannot maximize the 3 links for your internet browsing or accessing external network activities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet access will go mainly via Link#1 as it has highest metric or priority. The other 2 links will probably do nothing until Link#1 down. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***But again, there might be an issue as PIX will not know/aware (not intelligence) if Link#1 is down. This will make it to keep pushing/sending traffic out through that link. That's why a router is needed. But you can always use Link#2 &amp;amp; Link#3 for for specific traffic, e.g use Link#2 for email traffic, Link#3 for DNS and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively, if you want, you can try this (attach config) theory, although this is still subjected to the above *** statement. The execption is each internal address/subnet will use specific link to go out/to internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For PIX OS, if possible, use the latest 6.x version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 May 2006 10:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-with-3-wan-connection/m-p/525416#M501199</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-05-23T10:53:57Z</dc:date>
    </item>
  </channel>
</rss>

