I have following devices for my communication rack,
- one Cisco ASA 5510 security plus
- one Cisco 2811 router
- one Cisco 3560G (layer 3) switch
- 1 linksys 24 port switch
Internet connection (1) is connected with Cisco Router port fa0/1 and live Ip is configured
fa0/0 is connected with ASA having Ip address 192.168.74.1
ASA has three interfaces configured,
Servers are attached with DMZ
Cisco 3560G is connected with Inside
Cisco Router is attached with outside
security level 50 for DMZ
100 for Inside
0 for outside
currently, site-to-site vpn and remote access ipsec VPN is configured on CISCO ROUTER,
Vlans are configured on cisco switch,
I want to add another Internet connection to my ASA 4th port
nat-control is not enabled on ASA,
I cannot enable nat-control, otherwise, my internal network mapped into one ip and don't appear on my monitoring server,
please advise, how can I configure my 4th port on the ASA for internet access only to inside network, DMZ will use primary internet connection via router, because remote users will connect via cisco vpn client,
if I enable NAT in ASA, my inside network dont connects with DMZ,
I don't know if this will be possible. Simple routing determines which way the traffic flows to the Internet from Inside and DMZ, they'll always use the same 0.0.0.0 route. Policy Based Routing (routing based on source) doesn't exist in ASA. It is possible to setup a backup Internet connection and use IP SLA to monitor the primary link, but that's not what you are trying to do. Did I understand you correctly, you want Inside hosts to use primary Internet connection and DMZ hosts to use secondary Internet connection? One solution would be to do routing on the next hop after the firewall. Connect second Internet connection to your router (or you could have two routers in HSRP), and then use policy-based routing to route 0.0.0.0 to a different Internet connection depending on your source IP address. You can then NAT inside addresses to one PUB IP and NAT DMZ addresses to another PUB IP on ASA.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...