<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using multiple outside interface on ASA 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457255#M613668</link>
    <description>&lt;P&gt;Hi Moderator,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the following query with regards to Firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Will global nat forward the traffic to respective gateways of ISP i.e Global ID 13, should always forward to 100.X.X.X and 14 should 200.X.X.X&amp;nbsp; through default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) In the event of primary internet goes down, what are the challenges ? assuming i have ISP independent public IP pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S Kumar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*********Config START************************************&lt;/P&gt;&lt;P&gt;interface Gi0/0&lt;BR /&gt;description Primary Internet&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 100.X.X.X 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Gi0/1&lt;BR /&gt;description Secondary Internet&lt;BR /&gt;nameif outside-2&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 200.X.X.X 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Gi0/2&lt;BR /&gt;description Corporate network&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;route inside 10.10.20.0 255.255.255.0 10.10.10.10 1&lt;BR /&gt;route inside 10.10.30.0 255.255.255.0 10.10.10.10 1&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;global (outside) 13 100.X.X.X&lt;BR /&gt;global (outside) 14 200.X.X.X&lt;/P&gt;&lt;P&gt;nat (inside) 13 10.10.20.0 255.255.255.0&lt;BR /&gt;nat (inside) 14 10.10.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 100.X.X.X&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 200.X.X.X&lt;BR /&gt;************Config-END*********************************&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:29:23 GMT</pubDate>
    <dc:creator>sk2317</dc:creator>
    <dc:date>2019-03-11T18:29:23Z</dc:date>
    <item>
      <title>Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457255#M613668</link>
      <description>&lt;P&gt;Hi Moderator,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the following query with regards to Firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Will global nat forward the traffic to respective gateways of ISP i.e Global ID 13, should always forward to 100.X.X.X and 14 should 200.X.X.X&amp;nbsp; through default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) In the event of primary internet goes down, what are the challenges ? assuming i have ISP independent public IP pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S Kumar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*********Config START************************************&lt;/P&gt;&lt;P&gt;interface Gi0/0&lt;BR /&gt;description Primary Internet&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 100.X.X.X 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Gi0/1&lt;BR /&gt;description Secondary Internet&lt;BR /&gt;nameif outside-2&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 200.X.X.X 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Gi0/2&lt;BR /&gt;description Corporate network&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;route inside 10.10.20.0 255.255.255.0 10.10.10.10 1&lt;BR /&gt;route inside 10.10.30.0 255.255.255.0 10.10.10.10 1&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;global (outside) 13 100.X.X.X&lt;BR /&gt;global (outside) 14 200.X.X.X&lt;/P&gt;&lt;P&gt;nat (inside) 13 10.10.20.0 255.255.255.0&lt;BR /&gt;nat (inside) 14 10.10.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 100.X.X.X&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 200.X.X.X&lt;BR /&gt;************Config-END*********************************&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457255#M613668</guid>
      <dc:creator>sk2317</dc:creator>
      <dc:date>2019-03-11T18:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457256#M613669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kumar,&lt;/P&gt;&lt;P&gt;I believe you meant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside-2 0.0.0.0 0.0.0.0 200.X.X.X and not route outside 0.0.0.0 0.0.0.0 200.X.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In either case the ASA can only load balance up to 3 default GW out the SAME interface not out diff. interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to do PBR (Policy Based Routing) using a Layer 3 device on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Pls. read this thread where I have answered this in the past: &lt;/SPAN&gt;&lt;A class="jive-link-message-small" href="https://community.cisco.com/message/894920#894920"&gt;https://supportforums.cisco.com/message/894920&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can also do SLA route tracking: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Aug 2010 13:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457256#M613669</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-23T13:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457257#M613670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply and correction as follow.&lt;/P&gt;&lt;P&gt;route outside-2 0.0.0.0 0.0.0.0 200.X.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to load balance outbound traffic based on Global nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I.e Few vlans would use global nat 13 to forward traffic to OUTSIDE (interface)&lt;/P&gt;&lt;P&gt; and remaining vlan would use global nat 14 to forward traffic to OUTSIDE-2 (interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the event of outage at primary ISP, both Global nat 13 and 14 should use the OUTSIDE-2 (interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would this workout practically ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Aug 2010 14:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457257#M613670</guid>
      <dc:creator>sk2317</dc:creator>
      <dc:date>2010-08-23T14:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457258#M613671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, only in the scenario that I mentioned on the thread link that I enclosed. Pls. read that. You cannot add two default routes on the ASA pointing to two diff. interface.&amp;nbsp; It does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /&lt;/P&gt;&lt;P&gt;inside---ASA---Rourter/&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside-2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Aug 2010 14:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457258#M613671</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-23T14:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457259#M613672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since i have two different public pool, how will it accomadate two IP network between ASA &amp;lt;-----to------&amp;gt; Router ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As, asa does not seems to support sub-interface, or secondary command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Aug 2010 15:14:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457259#M613672</guid>
      <dc:creator>sk2317</dc:creator>
      <dc:date>2010-08-23T15:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457260#M613673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kumar,&lt;/P&gt;&lt;P&gt;You can use any IP address on the ASA to translate. An interface doesn't have to be configued on the ASA to be able to use the IP block for translation. You can just use a private ip subnet between the ASA and the Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like I discussed on that previous thread, you can use ISP1 block one for all dynamic nat translations and use ISP2 block IP for all static nat translations - all on the ASA.&amp;nbsp; Then the router will look at the packet if it has source address provided by ISP1 (after translation from the ASA) then it will send the packet via ISP1 link and if the packets have the source address of ISP2 (after translation from the ASA) provided address then it will send the packets via ISP2 link. This can be configued using PBR - route maps and setting the next hop on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Aug 2010 15:24:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457260#M613673</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-23T15:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457261#M613674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As said, having configured private IP between ASA and Router, Will i be able to terminate Site to Site VPN or Remote VPN on ASA ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kumar.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Aug 2010 17:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457261#M613674</guid>
      <dc:creator>sk2317</dc:creator>
      <dc:date>2010-08-23T17:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457262#M613675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So long as the router can translate the ASA's outside interface statically (1-1) to a routable address, I don't see why not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Aug 2010 12:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/1457262#M613675</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-24T12:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/3194255#M613676</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am plaiing to do the Primary and Backup setup on ASA , how the when primary fail over to backup&lt;/P&gt;
&lt;P&gt;what will happen to all NAT config&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static FR-abc-company-Network FR-abc-company-Network destination static BE-abc-company-Network BE-abc-company-Network no-proxy-arp route-lookup&lt;BR /&gt;2 (inside) to (outside) source static FR-abc-company-Network FR-abc-company-Network destination static US-abc-company-Network US-abc-company-Network no-proxy-arp route-lookup&lt;BR /&gt;4 (inside) to (outside) source static FR-abc-company-Network FR-abc-company-Network destination static SG-abc-company-Network SG-abc-company-Network no-proxy-arp route-lookup&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static obj-10.22.0.99 178.132.22.10&lt;BR /&gt;2 (Guest) to (outside) source dynamic Guest-Network interface&lt;BR /&gt;3 (inside) to (outside) source dynamic obj_any interface&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Do I need to created another setup of Manual and Auto NAT rules for "backup" outside interface&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (backup) source static FR-abc-company-Network FR-abc-company-Network destination static BE-abc-company-Network BE-abc-company-Network no-proxy-arp route-lookup&lt;BR /&gt;2 (inside) to (backup) source static FR-abc-company-Network FR-abc-company-Network destination static US-abc-company-Network US-abc-company-Network no-proxy-arp route-lookup&lt;BR /&gt;4 (inside) to (backup) source static FR-abc-company-Network FR-abc-company-Network destination static SG-abc-company-Network SG-abc-company-Network no-proxy-arp route-lookup&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (backup) source static obj-10.22.0.99 192.135.20.10&lt;BR /&gt;2 (Guest) to (backup) source dynamic Guest-Network interface&lt;BR /&gt;3 (inside) to (backup) source dynamic obj_any interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Oct 2017 11:44:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/3194255#M613676</guid>
      <dc:creator>Kan2</dc:creator>
      <dc:date>2017-10-05T11:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Using multiple outside interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/3758789#M613677</link>
      <description>Hi, I'm Joseph. I'm using an ASA5540 firewall router to Connect my LAN to my ISP, the LAN is on the inside interface of the router while the ISP is on the outside interface. From my LAN I can ping the inside interface but I can't ping the outside interface. Apparently two distant interfaces on a CISCO asa router cannot by default communicate with each other, so I'm looking for a way to link the two interfaces. Any help will be greatly appreciated. Thanks.</description>
      <pubDate>Thu, 06 Dec 2018 08:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-multiple-outside-interface-on-asa-5520/m-p/3758789#M613677</guid>
      <dc:creator>Elopower123</dc:creator>
      <dc:date>2018-12-06T08:31:47Z</dc:date>
    </item>
  </channel>
</rss>

