ā07-01-2010 12:57 PM - edited ā03-11-2019 11:06 AM
Is it possible to pass traffic from an Avaya PBX -> ASA5520 on outside (security level 100) and outside1 (security level 100) to another ASA 5520 on an outside interface (security 100) and then internally to voice vlan. See diagram for better understanding. Is this possible anything to look out for? I will be using static routes
Solved! Go to Solution.
ā07-01-2010 04:10 PM
I don't see a reason why it wouldn't.
A couple of things to be aware off:
- For traffic between same security level, you would need to turn on "same-security-traffic permit inter-interface"
- As you have mentioned, you will be configuring static routes on all interfaces, that would be the way to go as you can't have 2 default gateways pointing towards 2 outside interfaces.
- I am also assuming that you will not be NATing the voice traffic, and the left hand side ASA has inside interface of security level of 100 as well, then you can either disable nat-control, or configure NAT exemption.
Hope that helps.
ā07-01-2010 04:10 PM
I don't see a reason why it wouldn't.
A couple of things to be aware off:
- For traffic between same security level, you would need to turn on "same-security-traffic permit inter-interface"
- As you have mentioned, you will be configuring static routes on all interfaces, that would be the way to go as you can't have 2 default gateways pointing towards 2 outside interfaces.
- I am also assuming that you will not be NATing the voice traffic, and the left hand side ASA has inside interface of security level of 100 as well, then you can either disable nat-control, or configure NAT exemption.
Hope that helps.
ā07-02-2010 07:19 AM
Thank you very much for you answer was very helpful
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: