I am trying to split traffic entering from the web for servers so everything goes over the ADSL link but time sensitive information such as Sharepoint (TCP80) go direct over the ESHDSL link, now the problem is traffic that enters through the ESHDSL hits the server, the server replies out of its default gateway which is the ADSL which doesnt know what to do since it does not have a NAT entry for its return path.
How can I make it so traffic can enter one router and exit the other?
The two routers have HSRP to provide fail over between the two, and BGP is setup so one BGP route goes ESHDSL-ADSL and the other ADSL-ESHDSL
I’ll share my setup incase it sparks something for you. I have two edge routers, each with their own BGP connection to the same ISP. The two edge routers each connect to their own switch via an 802.1Q trunk; the switches also have an 802.1.Q trunk between them, allowing the routers to talk on the “inside”. Instead of HSRP, the routers run GLBP on the inside, taking turns as the default gateway and routing traffic out to the ISP. This creates an outbound load sharing that has worked well.
Inbound is a different story. I’m lucky enough to have two public IP blocks. I’ve engineered things is such a way that specific systems live on a specifics blocks. I have two high traffic systems, system A is on block 1 and system B is on block 2. Through the use of pre-pending my BGP updates to the ISP, the ISP prefers to send all inbound traffic to system A’s block through Router1 and all inbound traffic to system B’s block through Router2. It doesn't create a precise load balancing, but atleast traffic is comming in both circuits and not just bogging down one of the circuits. If a router/circuit would fail, BGP will just send all inbound traffic through the remaining router/circuit
The biggest difference however is that I don’t do NAT on my edge routers. They are basically dedicated to BGP/routing and that’s it. We have a firewall cluster (non Cisco) connected to each switch behind our edge routers that does the NATing.
The cat's out of the bag! In October 2020, Cisco announced the Next Generation of Enterprising Routing Platforms: the Catalyst 8000 Edge Platforms Family including the Catalyst 8200, Catalyst 8300, Catalyst 8500, and Catalyst 8000V. The new family of Cats...
Community Live- Smart Licensing Using Policy (Routing) – A Simplified Licensing Approach
(Live event - Tuesday, 18 May, 2021 at 9:00 am Pacific/ 1:00 pm Eastern / 7:00 pm Paris)
This event will have place on Tuesday 18th, May 2021 at 9:00 hrs PDT&nb...
Welcome to the overview guide that covers the latest in Cisco Networking and Data Center innovations and new product introductions. You'll find information on Intent Based Networking updates, special promotions and free trials, as well as exclusive upcom...
Listen: https://smarturl.it/CCRS8E13 99% of organizations use certifications to make hiring decisions. The reason is simple: Cisco certifications bring valuable, measurable rewards to certified IT professionals and the organizations that employ them....
Cisco AI Endpoint Analytics – Deployment guide
This deployment guide is meant for Cisco AI Endpoint Analytics adoption for customers, partners and everyone focusing on Endpoint Visibility and to how achieve it with Endpoint Analytics. It has sections that...