<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dual ISP/link on ASA 5506-x in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3771440#M8120</link>
    <description>&lt;P&gt;I figured out myself! I overlooked the manual NAT configuration. I configured manual NAT for the outside2 interface and it works.&lt;/P&gt;&lt;P&gt;I will post my topology and configuration shortly.&lt;/P&gt;</description>
    <pubDate>Wed, 02 Jan 2019 15:19:17 GMT</pubDate>
    <dc:creator>Jangchup</dc:creator>
    <dc:date>2019-01-02T15:19:17Z</dc:date>
    <item>
      <title>Dual ISP/link on ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3770019#M8119</link>
      <description>&lt;P&gt;Hi, I am trying to&amp;nbsp;configure Dual ISP feature in ASA 5506-x, like the one which is available is ASA 5505 with two different outside interfaces. e.g. outside1 and outside2&lt;/P&gt;&lt;P&gt;However, on ASA 5506-x every time when I configure NAT statement for the outside2 interface it overrides the previous NAT statement for the outside1. It seems on ASA 5506-x I can have only one auto NAT statement where as in ASA 5505 this was not an issue at all.&lt;/P&gt;&lt;P&gt;Can someone&amp;nbsp;help me to figure out to achieve this on ASA 5506-x.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Jangchup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 06:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3770019#M8119</guid>
      <dc:creator>Jangchup</dc:creator>
      <dc:date>2020-02-22T06:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP/link on ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3771440#M8120</link>
      <description>&lt;P&gt;I figured out myself! I overlooked the manual NAT configuration. I configured manual NAT for the outside2 interface and it works.&lt;/P&gt;&lt;P&gt;I will post my topology and configuration shortly.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 15:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3771440#M8120</guid>
      <dc:creator>Jangchup</dc:creator>
      <dc:date>2019-01-02T15:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP/link on ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3772293#M8121</link>
      <description>&lt;P&gt;please fw/ post (securely) Im very curious. I also wonder how this may be possible in a dual ASA fail over senerio w/ 2 different ISP egress'.... anyone?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 15:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3772293#M8121</guid>
      <dc:creator>Lukaszoo</dc:creator>
      <dc:date>2019-01-03T15:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP/link on ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3772741#M8122</link>
      <description>&lt;P&gt;I've got a similar setup, with 2 ISPs over PPPoE but because PPPoE is done to the same ISP, one always overwrites the other so the second router was setup as a double-NAT router instead of the modem-only mode with PPP pass-through. I then configured policy based routing to allow for certain traffic to flow over the second connection.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 09:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3772741#M8122</guid>
      <dc:creator>Dmitry Golovenkin</dc:creator>
      <dc:date>2019-01-04T09:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP/link on ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3773583#M8123</link>
      <description>&lt;P&gt;Here I have posted the topology and configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ASA topology.JPG" style="width: 691px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/27153i7C987C3993C39C93/image-size/large?v=v2&amp;amp;px=999" role="button" title="ASA topology.JPG" alt="ASA topology.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Active Firewall Configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA/act/pri# sh running-config&lt;BR /&gt;ASA Version 9.6(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;domain-name mydomain.com&lt;BR /&gt;enable password PVSASRJovmamnVkD encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0 standby 10.10.10.2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description Link to ATT&lt;BR /&gt;nameif outside1&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.2 255.255.255.248 standby 192.168.1.3&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description Link to Nitel&lt;BR /&gt;nameif outside2&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 172.16.1.2 255.255.255.248 standby 172.16.1.3&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;description STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name mydomain.com&lt;BR /&gt;object network LAN&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;pager lines 23&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside1 1500&lt;BR /&gt;mtu outside2 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface FAILOVER GigabitEthernet0/4&lt;BR /&gt;failover link SFF GigabitEthernet0/3&lt;BR /&gt;failover interface ip FAILOVER 10.20.200.1 255.255.255.0 standby 10.20.200.2&lt;BR /&gt;failover interface ip SFF 10.20.100.1 255.255.255.0 standby 10.20.100.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;nat (inside,outside2) source dynamic LAN interface&lt;BR /&gt;!&lt;BR /&gt;object network LAN&lt;BR /&gt;nat (inside,outside1) dynamic interface&lt;BR /&gt;route outside1 0.0.0.0 0.0.0.0 192.168.1.1 1 track 1&lt;BR /&gt;route outside2 0.0.0.0 0.0.0.0 172.16.1.1 10&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.248 outside1&lt;BR /&gt;http 172.16.1.0 255.255.255.248 outside2&lt;BR /&gt;http 10.10.10.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sla monitor 123&lt;BR /&gt;type echo protocol ipIcmpEcho 8.8.8.8 interface outside1&lt;BR /&gt;num-packets 3&lt;BR /&gt;frequency 10&lt;BR /&gt;sla monitor schedule 123 life forever start-time now&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside1&lt;BR /&gt;crypto ikev1 enable outside2&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 123 reachability&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 20.20.30.0 255.255.255.252 outside1&lt;BR /&gt;ssh 20.20.20.0 255.255.255.252 outside2&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin privilege 15&lt;BR /&gt;username cisco password foQlyHSFHLC0HPmR encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns migrated_dns_map_1&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context state priority&lt;/P&gt;&lt;P&gt;ASA/act/pri#&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 23:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-link-on-asa-5506-x/m-p/3773583#M8123</guid>
      <dc:creator>Jangchup</dc:creator>
      <dc:date>2019-01-05T23:53:00Z</dc:date>
    </item>
  </channel>
</rss>

