This configuration provides a relatively inexpensive way to ensure that outbound Internet access remains available to users behind the security appliance. As described in this document, this setup may not be suitable for inbound access to resources behind the security appliance. Advanced networking skills are required to achieve seamless inbound connections
How can we configure the inbound reduntant for the outside users access to the inside servers.
Re: Firewall outbound failover ok but hot to do the inbound
You have a couple of options. First, use a DNS round robin. Have two "A" records for your server,i.e. www.domain.com 192.168.0.1 and www.domain.com 10.1.1.1. I do not recommend this option as it will cause a 50% fail rate on access your server.
Second option, get two routers, an autonomous system number and block of IP address from ARIN and run BGP, between your two ISPs.
Depending on the amount of network traffic, you may be able to get by with a 2800 series ISR.
This is all based on the diagram I see from the link and is very high level. If you have further questions please don't hesitate to ask.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...