08-24-2016 12:34 AM - edited 03-12-2019 01:10 AM
Hi Folks
I Wonder if ASA 5516 can handled 4x WAN connections? Yes i believed it can handled 5516 dual WAN for primary and backup connection. But what if you have 4x WAN connection.
Regards
Randy.
08-09-2021 04:47 AM - edited 08-09-2021 04:49 AM
I have de same problem with a Firepower 2100.
Can someone help me please?
08-09-2021 05:41 AM - edited 08-09-2021 05:42 AM
Could you please explain in more details what do you expect to achieve with 4 WAN connections? Is is the case in which on each link only certain traffic is getting routed? Or they are also redundant one to eachother?
If you are using certain link for certain traffic, you can consider each link as an idependent one - you'll assign each link its own security zone and route certain traffic towards it.
If they are also providing redundancy, you can assign multiple interfaces into same security zone. This way you can assign certain rules to same zone (e.g. NAT rule will be from Inside to Outside, while Oustide zone will actually have WAN1-WAN4 interfaces). you can find more info about zones here.
Not sure if it answers your question.
BR,
Milos
08-09-2021 07:35 AM
Thank you very much for the reply.
Extensive information:
We currently have 2 routers before the firewall.
The first one only does NAT towards the Public IPs, at first they were assigned to IPs with the same subnet, now we have changed them to different subnets and they have been as follows: 172.16.1.1; 172.16.3.1; 172.16.4.1 -172.16.9.1 with 172.16.3.2 being the gateway.
We want to remove the second one, but at this moment it has another NAT that redirects all the traffic that arrives from the WAN interface of the firewall (172.16.2.2) towards the gateway 172.16.2.1.
Everything that enters or leaves the firewall does so through the WAN interface (172.16.2.2) and the static route has 172.16.2.1 as its gateway.
We have created in another interface the 8 subnets, one for each NAT towards its public IP, all the traffic tries to go out through the 172.16.2.1 gateway.
Summarizing.
My questions are:
Can I separate the traffic of each public IP so that they can be accessed by different services, one for the Internet, another for the exchange mail, another for VPN for example?
If so, should I modify the gateway of static route?
again I appreciate your help
08-09-2021 11:28 PM
Hi @GUSTAVI,
Main purpose of having multiple interfaces is (in most cases) to provide redundancy (e.g. to have 2 Internet links) and/or to separate services (e.g. Internet link for browsing and publishing services and WAN to reach stores). I personally don't see benefit of trying to separate public services on multiple links, due to several reasons:
You can still have multiple trusted segments being published on their own public IPs. You just need to differentiate security services (such as NAT/PAT and ACL) from routing. Your routing will most likely be unique on FW (unless PBR is introduced), so you'll have one default GW. In case you need to use multiple links for same purpose (e.g. ISP is providing you with 2 links, with 2 different interlinks), I would advise to use security zone for this (you would create interfaces Outside1 and Outside2, but both would be member of zone Outside, and your NAT rulles would use Outside as a keyword).
BR,
Milos
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide