Passing traffic from outside -> outside1 and outside interface on ASA 5520

Answered Question
Jul 1st, 2010

Is it possible to pass traffic from an  Avaya PBX -> ASA5520 on outside (security level 100) and outside1 (security level 100) to another ASA 5520 on an outside interface (security 100) and then internally to voice vlan. See diagram for better understanding. Is this possible anything to look out for? I will be using static routes

I have this problem too.
0 votes
Correct Answer by Jennifer Halim about 6 years 6 months ago

I don't see a reason why it wouldn't.

A couple of things to be aware off:

- For traffic between same security level, you would need to turn on "same-security-traffic permit inter-interface"

- As you have mentioned, you will be configuring static routes on all interfaces, that would be the way to go as you can't have 2 default gateways pointing towards 2 outside interfaces.

- I am also assuming that you will not be NATing the voice traffic, and the left hand side ASA has inside interface of security level of 100 as well, then you can either disable nat-control, or configure NAT exemption.

Hope that helps.

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 5 (1 ratings)
Loading.
Correct Answer
Jennifer Halim Thu, 07/01/2010 - 16:10

I don't see a reason why it wouldn't.

A couple of things to be aware off:

- For traffic between same security level, you would need to turn on "same-security-traffic permit inter-interface"

- As you have mentioned, you will be configuring static routes on all interfaces, that would be the way to go as you can't have 2 default gateways pointing towards 2 outside interfaces.

- I am also assuming that you will not be NATing the voice traffic, and the left hand side ASA has inside interface of security level of 100 as well, then you can either disable nat-control, or configure NAT exemption.

Hope that helps.

Actions

This Discussion