04-18-2017 11:13 PM - edited 03-12-2019 02:14 AM
Hi All,
I am very confused about the config for the outside switches for active/standby asa with dual ISP connections. The image below is from the firewall and ips design CVD.
If the ASA's outside interfaces are in the private address range how does one on the internet access the services behind the firewall if the public routable IP is not on the firewalls? How would vpn access work? Or how would you NAT insides services to the public ip's?
Does anyone have a sample config for the outside switches?
Inside network----(IN)ASA(OUT)----Private_IP---Outside Switches---Public /30 IP---Internet.
04-19-2017 01:21 AM
The private addresses are only examples here. Typically you configure your two outside interfaces with the public IPs that you got from your ISP.
04-19-2017 08:33 AM
Thanks for replying. So in that case would it be like this:
- ASA primary would have 2 public IP's configured. there would not be any standby IP for each of the public IP's because the isp only provides 1 free public ip. I assume this would not affect failover as the standby ASA would get the same public IP used by the primary during failover?
- outside switches will be purely L2 for this traffic. Just trunking two vlans (one for each ISP)?
- would there be a duplication of the NAT configuration (one for each outside interface)?
- is there any good configuration examples which includes what the NAT config would look like for dual ISP and also outside switches?
04-19-2017 08:37 AM
you are right with your assumptions. You don't need to have standby IPs, although the detection of failover conditions is limited. But that is probably not relevant in your scenario.
All NAT has to be duplicated for both interfaces and you need to have a backup default-route with higher AD configured to your secondary ISP.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide