cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1659
Views
0
Helpful
4
Replies

ASA 5516 - Multiple WAN connection (4 WAN)

randyinfante21
Level 1
Level 1

Hi Folks

I Wonder if ASA 5516 can handled 4x WAN connections? Yes i believed it can handled 5516 dual WAN for primary and backup connection. But what if you have 4x WAN connection.

Regards

Randy. 

4 Replies 4

GUSTAVI
Level 1
Level 1

I have de same problem with a Firepower 2100.

Can someone help me please?

 

Milos_Jovanovic
VIP Alumni
VIP Alumni

Could you please explain in more details what do you expect to achieve with 4 WAN connections? Is is the case in which on each link only certain traffic is getting routed? Or they are also redundant one to eachother?

If you are using certain link for certain traffic, you can consider each link as an idependent one - you'll assign each link its own security zone and route certain traffic towards it.

If they are also providing redundancy, you can assign multiple interfaces into same security zone. This way you can assign certain rules to same zone (e.g. NAT rule will be from Inside to Outside, while Oustide zone will actually have WAN1-WAN4 interfaces). you can find more info about zones here.

Not sure if it answers your question.

BR,

Milos

Thank you very much for the reply.
Extensive information:
We currently have 2 routers before the firewall.

The first one only does NAT towards the Public IPs, at first they were assigned to IPs with the same subnet, now we have changed them to different subnets and they have been as follows: 172.16.1.1; 172.16.3.1; 172.16.4.1 -172.16.9.1 with 172.16.3.2 being the gateway.

We want to remove the second one, but at this moment it has another NAT that redirects all the traffic that arrives from the WAN interface of the firewall (172.16.2.2) towards the gateway 172.16.2.1.

Everything that enters or leaves the firewall does so through the WAN interface (172.16.2.2) and the static route has 172.16.2.1 as its gateway.

We have created in another interface the 8 subnets, one for each NAT towards its public IP, all the traffic tries to go out through the 172.16.2.1 gateway.

 

Summarizing.
My questions are:
Can I separate the traffic of each public IP so that they can be accessed by different services, one for the Internet, another for the exchange mail, another for VPN for example?

If so, should I modify the gateway of static route?

 

again I appreciate your help

Hi @GUSTAVI,

Main purpose of having multiple interfaces is (in most cases) to provide redundancy (e.g. to have 2 Internet links) and/or to separate services (e.g. Internet link for browsing and publishing services and WAN to reach stores). I personally don't see benefit of trying to separate public services on multiple links, due to several reasons:

  • Main one is routing - at the end of the day, people still need to reach your services over Internet link. Assuming that you have one provider, they will route your public IP scope over one link anyway.
  • Previously stated was for inbound traffic. For outbound traffic, you'll normally have one default route, so your outbound traffic will always leave over one single link. If you want to route certain traffic over certain links, you would need to introduce PBR (policy-based routing), which I personally don't like, esspecially on FW
  • By using multiple links this way, you are risking asymetry in traffic, which FW hates, and most likely, you'll face issues with dropped traffic
  • It brings additional complexity to entire setup, and troubleshooting of this would be a nightmare for anyone who didn't implement it

You can still have multiple trusted segments being published on their own public IPs. You just need to differentiate security services (such as NAT/PAT and ACL) from routing. Your routing will most likely be unique on FW (unless PBR is introduced), so you'll have one default GW. In case you need to use multiple links for same purpose (e.g. ISP is providing you with 2 links, with 2 different interlinks), I would advise to use security zone for this (you would create interfaces Outside1 and Outside2, but both would be member of zone Outside, and your NAT rulles would use Outside as a keyword).

BR,

Milos

Review Cisco Networking for a $25 gift card