ASA 5510, forcing an inside interface to go out the backup ISP link?
We have a 5510 and I have a second ISP setup for a backup link. We have 4 ports connected to 4 different internal subnets. I want to force one of the ports to use the backup ISP link at all times. I'm having a little problem with where I need to make the changes in my ASA.
Interface "outside" is my main ISP
Interface "building3" is my backup ISP.
I want to force the "Guest" network to use the "building3" link for all traffic.
Here's a snippet of my config
global (outside) 10 interface
global (building3) 10 interface
nat (inside) 0 access-list nonat
nat (inside) 10 0.0.0.0 0.0.0.0
nat (Guest) 10 0.0.0.0 0.0.0.0
access-group inbound in interface outside
access-group Guest_access_in in interface Vendor
access-group building3_access_in in interface building3
Hi Everyone,I have 2 queries1. After we configure the IPSec VPN in a Cisco Router, how do we identify and check that the traffic is flowing through the tunnel? Are there any commands and ways to find it out?2. What are some of t...
Cisco Champion Radio · S7|E29 Increase Visibility and Enhance Security with Cisco AI Endpoint Analytics
Cisco is on a journey to making networking smarter with artificial intelligence and machine learning. The latest stop in this journey, Cisco AI...
Community Live video- Introduction to Smart Licensing on Catalyst Switches
(Live event - formerly known as Webcast- Thursday 30 July, 2020 at 10 am Pacific/ 1 pm Eastern / 7 pm Paris)
This event had place on Thursday 30th, July 2020 at 10hrs PDT&nb...
To participate in this event, please use the button to ask your questions
This topic is a chance to clarify your questions about smart licensing on Cisco Catalyst switches, including 9000 (9200, 93...