08-05-2007 03:10 AM - edited 03-11-2019 03:53 AM
I have pix515E with 6 interface. Now one outside interface configure. But i want to create two outside interface. That means that two internet connection attach directly on pix515E.
Pls suggest me what is procedure to implemented it.
08-05-2007 04:19 AM
it really depends on what you're trying to accomplish, as well as a host of other things.
08-05-2007 11:15 AM
It should work Like this:
(pretending that ip's from ISP1 are 1.1.1.0/29
and ip's from ISP2 are 2.2.2.0/29)
nameif ethernet0 outside security0 {One ISp}
nameif ethernet1 inside security100
nameif ethernet2 DMZ security50
nameif ethernet3 ISPN security80 {Second ISP}
ip address outside 1.1.1.2 255.255.255.248
ip address inside 10.1.1.1 255.255.255.0
ip address DMZ 10.1.2.1 255.255.255.0
ip address ISPN 2.2.2.2 255.255.255.248
global (outside) 1 interface
global (ISPN) 1 interface {THIS IS MUST}
nat (inside) 1 10.1.1.0 255.255.255.0 0 0
route outside 0.0.0.0 0.0.0.0 1.1.1.1 1
route ISPN 130.239.18.151 255.255.255.255 2.2.2.1 1
Regards,
Dharmesh Purohit
08-05-2007 04:43 PM
the configuration looks ok, so long as you realize the only thing going out ISP 2 is traffic destined for host 130.239.18.151.
Also, you should probably make the security level of ISPN intf 0, just like you would an outside interface - unless you have a specific reason not to. WIth your posted config, any traffic from ISP2 has full access to your DMZ b/c of the higher security level.
08-05-2007 07:17 PM
First all thanks for advice. You are genius.
Two ISP is parallel working or it is back up ?
I have one DMZ location that location I already set mail and proxy server.
I want to configure first ISP represent first Proxy Server and Second ISP represent second proxy located on DMZ location.
Target it that some inside user browse internet through proxy 1 and some inside user browse internet through proxy 2.
Please help me sir
08-05-2007 05:56 PM
On version 7.X we have the option to configure a backup ISP but it will not work for load balancing. This backup ISP will come up if the primary fails. Here you will need two intefaces one for the primary and one for the backup.
Here is a config example:
08-20-2007 07:11 PM
I am running into a similar situation as this original requestor. I am running PIX OX v.8.02 and have configured my 2 ISPs using the redundant ISP method. The problem that I have is that I want to have simultaneous access to my WWW/DNS/SMTP servers from either ISP. I tried removing the tracked route and reconfigure as per the previous post with the exception of using an any any rule for the secondary ISP route and setting the security level to 0. The WWW/DNS/SMTP servers are only accessible from the primary ISP. Ideas?
08-20-2007 07:23 PM
get AS and use BGP with cisco router ?
as long as default gateway point to primary ISP all REPLY packets will go to primary.
please note that your second isp is REDUNDANT.
you always have one path to\from world.
if you want to share some load you can try to define routes for some networks to different ISP. for example: route 80.0.0.0/8 to primary
90.0.0.0/8 to secondary and so on :)
08-20-2007 08:03 PM
BGP is not an option as the two connections are over an ADSL links. These links are terminated on a Cisco 2651XM with Advancedenterprise 12.4 IOS w/2 WIC-ADSL. I am using private IP addressing on my two outside interfaces on the Cisco PIX515E. Ideaas?
08-21-2007 04:00 AM
Put a Cisco router inbetween the ISPs routers and the Pix. Pix will nat inside addresses to ISP addresses, then configure policy based routing on the router to policy-route the nat addresses to each of the respective ISPs. I have done similar to this before, whereby a customer wanted to aggregate 4 x ADSL links with each link using a different public IP address range, using a single ASA FW and a 2821 router with 4 ADSL interfaces.
08-21-2007 08:39 AM
I was thinking that I can do just that. I have the 2651XM and the PIX515E configured as follows:
-2xWIC-ADSL installed in 2651XM
-2xBVI interfaces configured on 2651XM to 2 separate ISPs.
-2xVLANs pointing to outside interface on PIX515E
-Outside interface on PIX515E is configured with 2xVLANs
-Each VLAN has been configured with security-level 0
-Both outside VLANs are using Private NAT IP addresses that are only routeable to the 2651XM
-I have a SMTP in DMZ1, 2xDNS servers in DMZ2, a Citrix server in DMZ3 and 2xWWW servers in DMZ4 configured on the firewall. Each of these servers have been configured for external access using PAT on the inbound and global NAT for outbound communications.
Using this configuration, if I am in the 2651XM router and perform a test to either one of the "outside" VLANs that are PAT'd to the appropriate server by using telnet 172.31.69.209 domain or 172.31.208 domain, I receive successful tests. But if I perform the same tests to the BVI interfaces (this is where the ISP addresses are configured) I only receive a successful response from the ISP that is configured with the default route on the PIX515E. So you are saying that policy based routing will resolve this issue?
08-21-2007 10:04 AM
My scenario didn't necessitate the need for vlans or BVIs. It seems in your scenario you should be able to use PBR to route traffic intended for ISP2, ignoring the default-route configured for ISP1.
In my case by using nat on the ASA and PBR on the router, I was able to load-balance traffic so that email was dedicated to ISP1, users with even IP addresses used ISP2, users with odd numbered IP addresses used ISP3 (they did not use a proxy) and VPN was dedicated for ISP4.
10-10-2007 07:54 PM
I would like to bump this one to the top again...I have made some modifications that is yielding some positive results. Here is how the topology has changed...instead of 1 router w/2 ADSL WICs installed with a single crossover connecting the Ethernet0 of the PIX515 to the F0/0 of the 2651XM I have two 2651XM routers w/1 ADSL WIC that are using VLANs connected to a Catalyst using trunk ports. I am now able to access both networks simutaneously for all the servers that are sitting behind the PIX. The only thing that I am not able to do is to use IPSec connections to the standby outside interface. I have confirmed that the routers are identical with NAT'ing with the exception of the IP address differences with the different networks. Ideas?
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: