cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
437
Views
0
Helpful
1
Replies

Two Routers Two ISP

Hello Everyone,i have two routers and two isp.i will need help on possible best way of integrating the two links either using a single router or using the two routers.The routers version are 1800 and 2900 respectively.Please find details below.I will appreciate your positive response towards this.

1800 series router details:


interface FastEthernet0
description $FW_OUTSIDE$$ETH-WAN$
ip address 45.222.X.X 255.255.X.X
ip nat outside
ip virtual-reassembly
ip policy route-map p3
duplex auto
speed auto
service-policy input sdmappfwp2p_SDM_MEDIUM
service-policy output sdmappfwp2p_SDM_MEDIUM
!
interface FastEthernet1
description $ETH-LAN$
ip address 192.X.X.X 255.255.255.0
ip virtual-reassembly
ip policy route-map p3
duplex auto
speed auto
!
interface FastEthernet1.1
!
interface FastEthernet2
switchport access vlan 200
!
interface FastEthernet3
switchport access vlan 200
!
interface FastEthernet4
switchport access vlan 110
!
interface FastEthernet5
switchport access vlan 110
!
interface FastEthernet6
switchport access vlan 150
!
interface FastEthernet7
switchport access vlan 110
!
interface FastEthernet8
switchport access vlan 110
!
interface FastEthernet9
switchport access vlan 110
!
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-FE 2$
no ip address
ip tcp adjust-mss 1452
shutdown
!
interface Vlan110
description $FW_INSIDE$
ip address 172.19.X.X 255.255.252.0
ip access-group 102 in
ip nbar protocol-discovery
ip nat inside
ip virtual-reassembly
service-policy input sdmappfwp2p_SDM_MEDIUM
service-policy output sdmappfwp2p_SDM_MEDIUM
!
interface Vlan10
no ip address

!
router eigrp 1
network 172.19.0.0
network 192.168.1.0
auto-summary
!
router ospf 1
log-adjacency-changes
network 172.19.0.0 0.0.255.255 area 0
network 192.168.1.0 0.0.0.255 area 0
network 192.168.100.0 0.0.0.255 area 0
distribute-list 50 out
!
ip route 0.0.0.0 0.0.0.0 41.X.X.X
ip route 0.0.0.0 0.0.0.0 45.222.X.X
ip route 192.168.0.0 255.255.0.0 172.19.X.X
!
ip dns server
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat translation udp-timeout 1000
ip nat inside source list 10 interface FastEthernet0 overload
ip nat inside source static tcp 172.19.X.X 9101 interface FastEthernet0 9101
ip nat inside source static tcp 172.16.X.X 3389 interface FastEthernet0 3389
ip nat inside source static tcp 172.16.X.X 25 interface FastEthernet0 25
ip nat inside source static tcp 172.16.X.X 443 interface FastEthernet0 443
ip nat inside source static tcp 172.19.X.X 8082 interface FastEthernet0 8082
ip nat inside source static tcp 172.19.X.X 995 interface FastEthernet0 995
ip nat inside source static tcp 172.19.X.X 110 interface FastEthernet0 110
ip nat inside source static tcp 172.19.X.X 143 interface FastEthernet0 143
ip nat inside source static tcp 172.19.X.X 993 interface FastEthernet0 993
!
ip access-list extended sdm_vlan110_in
remark SDM_ACL Category=1
permit tcp any eq smtp host 172.19.10.4 eq smtp
!
logging 172.19.10.1
access-list 10 remark permited network for internet access
access-list 10 permit 172.19.0.0 0.0.11.255
access-list 10 permit 172.16.0.0 0.0.255.255
access-list 12 permit 192.168.1.0 0.0.0.255
access-list 12 permit 192.168.100.0 0.0.0.255
access-list 100 permit tcp 172.19.0.0 0.0.11.255 eq smtp 172.16.0.0 0.0.255.255 eq smtp
access-list 100 permit tcp 172.19.0.0 0.0.11.255 eq www 172.16.0.0 0.0.255.255 eq www
access-list 100 permit tcp 172.19.0.0 0.0.11.255 eq 50363 172.16.0.0 0.0.255.255 eq 50636
access-list 100 permit tcp 172.19.0.0 0.0.11.255 eq 3306 172.16.0.0 0.0.255.255 eq 3306
access-list 100 permit udp 172.19.0.0 0.0.11.255 eq domain 172.16.0.0 0.0.255.255 eq domain
access-list 100 deny ip 172.19.0.0 0.0.11.255 172.16.0.0 0.0.255.255
access-list 100 permit ip 172.19.0.0 0.0.11.255 any
access-list 100 permit icmp 172.19.0.0 0.0.11.255 172.16.0.0 0.0.255.255
access-list 100 permit tcp 172.19.0.0 0.0.11.255 eq 50636 172.16.0.0 0.0.255.255 eq 50636
access-list 101 permit tcp 172.16.0.0 0.0.255.255 eq smtp 172.19.0.0 0.0.11.255 eq smtp
access-list 101 permit tcp 172.16.0.0 0.0.255.255 eq www 172.19.0.0 0.0.11.255 eq www
access-list 101 permit tcp 172.16.0.0 0.0.255.255 eq 3306 172.19.0.0 0.0.11.255 eq 3306
access-list 101 permit tcp 172.16.0.0 0.0.255.255 eq 50636 172.19.0.0 0.0.11.255 eq 50636
access-list 101 permit udp 172.16.0.0 0.0.255.255 eq domain 172.19.0.0 0.0.11.255 eq domain
access-list 101 permit icmp 172.16.0.0 0.0.255.255 172.19.0.0 0.0.11.255
access-list 101 deny ip 172.16.0.0 0.0.255.255 172.19.0.0 0.0.11.255
access-list 101 permit ip 172.16.0.0 0.0.255.255 any
access-list 102 permit tcp host 172.16.0.3 any eq smtp
access-list 102 deny tcp 172.16.0.0 0.0.255.255 any eq smtp log
access-list 102 permit ip any any
access-list 110 permit tcp 172.19.0.0 0.0.8.255 eq 50636 172.16.0.0 0.0.255.255 eq 50636
access-list 110 permit ip 172.19.0.0 0.0.11.255 any
access-list 111 permit tcp 172.16.0.0 0.0.255.255 eq 3389 172.19.0.0 0.0.11.255
access-list 111 permit ip 172.16.0.0 0.0.255.255 any
snmp-server community lirs RO
snmp-server community lirs123 RW
!
!
!
route-map p3 permit 132
match ip address 132
set ip next-hop 10.104.12.129
!
!
!
!

2900 Router


!
ip dhcp excluded-address 172.19.X.X 172.19.X.X
!
ip dhcp pool LIRS_LAN_POOL
network 172.19.X.X 255.255.252.0
default-router 172.19.X.X
dns-server 105.X.X.X .X.X.X.X 8.8.8.8 4.2.2.2
lease 0 23

!
redundancy
!
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/0.755
description 
encapsulation dot1Q 755
ip address 105.X.X.X 255.X.X.X
ip nat outside
ip virtual-reassembly in
!
interface GigabitEthernet0/1
description 
ip address 172.X.X.X 255.255.252.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
interface GigabitEthernet0/2
no ip address
shutdown
duplex auto
speed auto
!
ip default-gateway 105.X.X.X
ip forward-protocol nd
!
no ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip nat inside source list 100 interface GigabitEthernet0/0.755 overload
ip route 0.0.0.0 0.0.0.0 105.X.X.X
!
!
!
access-list 100 permit ip 172.19.8.0 0.0.3.255 any
!

1 Reply 1

Hi

If you are using 2 different ISP you could assign the 2900 as the primary router and the 1800 as backup and use any IGP to advertise a default route with different metrics to the internal network, so it will useful to select the main path and back up.

do you have a topology or could you please provide more details about your network?

:-)




>> Marcar como útil o contestado, si la respuesta resolvió la duda, esto ayuda a futuras consultas de otros miembros de la comunidad. <<
Review Cisco Networking products for a $25 gift card