05-05-2018 09:33 PM - edited 02-21-2020 07:42 AM
WE CONNECTED NEW ISP INTERFACE TO OUR CISCO ASA.ALREADY WE HAVE 2 ISP IN ASA.WE CONFIGURE THE INTERFACE FOR NEW ISP AND WRITE NEW NAT POLICY FOR ONE VLAN NETWORK TO CHECK WHETHER INTERNET IS WORKING OR NOT,INTERNET IS NOT WORKING.
OUR NAT POLICY IS LIKE
SOURCE INTERFACE IS NEW ISP INTERFACE
SOURCE ADDRESS IS 172.18.*.*/24
DESTINATION INTERFACE IS ANY
DESTINATION ADDRESS IN ANY
DYNAMIC PAT
SOURCE ADDRESS TRANSLATION IS OUTSIDE ISP INTERFACE
PLEASE HELP US TO SOLVE THIS ISSUE.
05-07-2018 12:10 AM
05-07-2018 12:13 AM
Again, here is the example I provided, see the text in red colour.
access-list testACL permit ip 10.10.10.0 255.255.255.0 any
route-map access-test permit 10
match ip address testACL
set next-hop <IP of ISP2>
interface gig0/1 <-- This interface is the on closest to your inside network
nameif inside
security-level 100
ip add 172.16.1.1 255.255.255.0
policy-route route-map access-test <-- This is the policy applied to the interface
05-07-2018 12:15 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide