05-05-2018 09:33 PM - edited 02-21-2020 07:42 AM
WE CONNECTED NEW ISP INTERFACE TO OUR CISCO ASA.ALREADY WE HAVE 2 ISP IN ASA.WE CONFIGURE THE INTERFACE FOR NEW ISP AND WRITE NEW NAT POLICY FOR ONE VLAN NETWORK TO CHECK WHETHER INTERNET IS WORKING OR NOT,INTERNET IS NOT WORKING.
OUR NAT POLICY IS LIKE
SOURCE INTERFACE IS NEW ISP INTERFACE
SOURCE ADDRESS IS 172.18.*.*/24
DESTINATION INTERFACE IS ANY
DESTINATION ADDRESS IN ANY
DYNAMIC PAT
SOURCE ADDRESS TRANSLATION IS OUTSIDE ISP INTERFACE
PLEASE HELP US TO SOLVE THIS ISSUE.
05-06-2018 12:31 AM
I am guessing that you did not take down the link to the existing ISP when you test? And I am also assuming that you have configured a default route pointing out the new ISP interface.
The issue is that the ASA does not support two active default routes at the same time. You would need to remove the current ISP link (and possibly the default route) to test this.
An option, if the second default route doesn't take over when the existing ISP interface is down is to set up SLA tracking.
05-06-2018 12:58 AM
Currently two active default routes for current isp and new isp.We didnt remove the current ISP link.Is there any other way for testing the new isp Link with the help of route Map??How to do IP SLA Tracking??
05-06-2018 04:30 AM
The route map is used for policy based routing (PBR). You could use this also. See the folloing link for a guide on PBR.
access-list testACL permit ip 10.10.10.0 255.255.255.0 any
route-map access-test permit 10
match ip address testACL
set next-hop <IP of ISP2>
interface gig0/1 <-- ingress interface of source traffic.
nameif inside
security-level 100
ip add 172.16.1.1 255.255.255.0
policy-route route-map access-test
SLA tracking is quite easy to set up.
sla monitor 1
type echo protocol IpIcmpEcho 8.8.8.8 interface outside
sla monitor schedule 1 start-time now life forever
track 10 rtr 1 reachability
route outside 0 0 track 10
route outside2 0 0 254
05-06-2018 04:38 AM
My doubts
10.10.10.0 255.255.255.0 ip address ==>> test vlan network ??
05-06-2018 04:40 AM
10.10.10.0/24 is just an example network I used. Yes this is the network you are testing from. You can limit this ACL to a single IP also if you choose.
05-06-2018 04:42 AM
sir,During these configuration any internet will down for other network?
Can you tell me the SLA tracking?
05-06-2018 04:44 AM
no internet will not go down when configuring it. Though when removing SLA tracking from the default route. you will need to remove the route completely and add it back without the tracking. In this case there might be a small "blip" but that should only last less than a second if you apply the change using a script.
05-06-2018 04:46 AM
without configure SLA tracking.My test scenario will work or not?
05-06-2018 04:49 AM
The issue will be that with and without SLA your network will go down if ISP 2 does not work or is not ready.
if you can not have any down time it is probably better to use policy based routing
05-06-2018 04:52 AM
05-06-2018 04:54 AM
Correct
05-06-2018 04:56 AM
05-06-2018 05:03 AM
hello,Any static route we need to configure for ISP Interface?Can you tell me the static Route is rquired or not?
05-06-2018 05:08 AM
Static route is not necessary when using PBR
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide