I inherited a network redesign project mid implementation and ran across an issue that I was not 100% sure able to be resolved. Implementation is occurring in which the organization is changing over to a different ISP and we have some customers that will not be able to change their settings over to our new addresses from some time. I have seen a lot of posts about fail over and dual ISP configurations, but I could not relate them to this particular scenario.
ISP1 - Old
ISP2 - New
2x ASA 5520 - DMZ
ASA 5520s are on version 8.0 and running Active/Active
We have an FTP server in our DMZ and a secondary server in our Internal LAN that customers communicate with. The issue that I have been faced with is that some customers will be using ISP1 while others are using ISP2 until the full transition occurs. Since the customers have explicit firewall rules that only accept communication from a certain source address, we cannot send out the traffic just on ISP2 until they change their settings.
Any ideas or thoughts on how to configure to be able to make this happen?
Isn't this just a routing problem? Destination-old-customer gateway=old-ISP. That will cause traffic destined for a specific destination to be routed from the old ISP address. Static routes, not sexy, but work.
If you are going to use the old ISP just for the traffic comming from the old customer YES, you can set up a static route on the ASA and the ASA will do a route lookup every time he receives or send a packet to that particular host so it should not be a problem.
Please rate helpful posts.
Julio Carvajal Senior Network Security and Core Specialist CCIE #42930, 2xCCNP, JNCIP-SEC
Multiple Cisco Security Technologies in a single book : ASA Firepower, WSA, Umbrella, ISE and VPN with 100 percent 100 practical scenarios with 70 Labs to cover important topics of the Cisco SCOR Exam. The best part is ISE with interesting scenarios wi...
Cisco Umbrella is a big DNS service that provides not only the DNS resolution but also if the hosted website is trust or malicious, the idea behind the Layer DNS Security is that the modern attacks uses the DNS in the first step either to redirect the use...
I shared with you this detailed document I created with 27 pages about Cisco ISE Integration With F5 BIG-IP Locar Traffic Manager LTM Load Balancer for Guest Acces.
The method used for Guest Access is the Self-Registration.
Healt Monitor using HTTP...
I created an IPSEC Site to site Tunnel between two ASA Firewalls in EVE-NG topology and i want to plot the IPSEC Site to Site VPN graph on PRTG ? The SNMP Walk command is not getting any output . As the firewall is making SNMP inbound connections with the...
The purpose of this document is to demonstrate how ISE can integrate with an eduroam external server which is a WI-Fi roaming service that provides international access to devices in education, research, and higher education. Students, teachers, and resea...