I don't think there are any serial WIC's available for the ASA series devices. What I've done in this scenario for my organization is to use an 1800 or 2800 series router with the appropriate WIC's, and then use one of its Ethernet interface to attach to the ASA. Works pretty well though it IS another device to manage.
Perhaps you are not understanding the response from Carl in the same way that I am. I believe that he is saying the the T1 (serial) connections are on a separate router. The router manages the T1 connections and routes packets from the Internet to the firewall (and packets from the firewall to the Internet). So adding another T1 is just a matter of adding another serial interface on the router (and possibly making appropriate changes in routing logic to use the extra interface). There would be no change at all on the ASA.
I totally understand what you are saying. I might not have been clear enough. I am adding a second internet router with a new set of public addresses and want to run that through the same firewall as well as the current 1 in place.
This certainly clarifies the issue. So you currently have 1 router connecting to the Internet/ISP with its own set of public addresses. Now you want to add a second router which will have another link to the Internet/ISP and will have its own set of public addresses.
Will both routers connect to the firewall through the same Ethernet subnet or will the second router connect to the firewall through a separate interface?
Is the router doing address translation from the inside (private) addresses to the outside (public) addresses or is the address translation in the firewall?
Do you want outbound traffic split between the two Internet links (load sharing) or do you want a primary/backup relationship for the links?
If we know these things we may be able to give you better answers.
Can you help me understand your current environment a bit better? On the existing router what is the IP addressing of its outside interface (connecting to the ISP) and the IP addressing of its inside interface (connecting to the firewall)?
Could you also tell me a bit about how you are currently doing the address translation in the firewall? Are there any static translations (to facilitate outside access to particular server resources inside your network) or is it all dynamic translation to support your outbound traffic?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :