07-01-2010 12:57 PM - edited 03-11-2019 11:06 AM
Is it possible to pass traffic from an Avaya PBX -> ASA5520 on outside (security level 100) and outside1 (security level 100) to another ASA 5520 on an outside interface (security 100) and then internally to voice vlan. See diagram for better understanding. Is this possible anything to look out for? I will be using static routes
Solved! Go to Solution.
07-01-2010 04:10 PM
I don't see a reason why it wouldn't.
A couple of things to be aware off:
- For traffic between same security level, you would need to turn on "same-security-traffic permit inter-interface"
- As you have mentioned, you will be configuring static routes on all interfaces, that would be the way to go as you can't have 2 default gateways pointing towards 2 outside interfaces.
- I am also assuming that you will not be NATing the voice traffic, and the left hand side ASA has inside interface of security level of 100 as well, then you can either disable nat-control, or configure NAT exemption.
Hope that helps.
07-01-2010 04:10 PM
I don't see a reason why it wouldn't.
A couple of things to be aware off:
- For traffic between same security level, you would need to turn on "same-security-traffic permit inter-interface"
- As you have mentioned, you will be configuring static routes on all interfaces, that would be the way to go as you can't have 2 default gateways pointing towards 2 outside interfaces.
- I am also assuming that you will not be NATing the voice traffic, and the left hand side ASA has inside interface of security level of 100 as well, then you can either disable nat-control, or configure NAT exemption.
Hope that helps.
07-02-2010 07:19 AM
Thank you very much for you answer was very helpful
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide