Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

ASA complex scenario

Dear all,

I have following devices for my communication rack,

- one Cisco ASA 5510 security plus

- one Cisco 2811 router

- one Cisco 3560G (layer 3) switch

- 1 linksys 24 port switch

my scenario

Internet connection (1) is connected with Cisco Router port fa0/1 and live Ip is configured

fa0/0 is connected with ASA having Ip address

ASA has three interfaces configured,




Servers are attached with DMZ

Cisco 3560G is connected with Inside

Cisco Router is attached with outside

security level 50 for DMZ

100 for Inside

0 for outside

currently, site-to-site vpn and remote access ipsec VPN is configured on CISCO ROUTER,

Vlans are configured on cisco switch,



I want to add another Internet connection to my ASA 4th port


nat-control is not enabled on ASA,

I cannot enable nat-control, otherwise, my internal network mapped into one ip and don't appear on my monitoring server,

please advise, how can I configure my 4th port on the ASA for internet access only to inside network, DMZ will use primary internet connection via router, because remote users will connect via cisco vpn client,

if I enable NAT in ASA, my inside network dont connects with DMZ,

Please help


Re: ASA complex scenario

I don't know if this will be possible. Simple routing determines which way the traffic flows to the Internet from Inside and DMZ, they'll always use the same route. Policy Based Routing (routing based on source) doesn't exist in ASA. It is possible to setup a backup Internet connection and use IP SLA to monitor the primary link, but that's not what you are trying to do. Did I understand you correctly, you want Inside hosts to use primary Internet connection and DMZ hosts to use secondary Internet connection? One solution would be to do routing on the next hop after the firewall. Connect second Internet connection to your router (or you could have two routers in HSRP), and then use policy-based routing to route to a different Internet connection depending on your source IP address. You can then NAT inside addresses to one PUB IP and NAT DMZ addresses to another PUB IP on ASA.



New Member

Re: ASA complex scenario

I discussed it with an expert, he said, its not possible, because I need to run BGP,

he said, you can load balance for general internet use,, but when VPN will involve, then I will need to run BGP,,

what do you say??,

as i said in my earlier post that I want to use only one connection for VPN and the other one for general internet surfing,,

vlans users will use general internet,, while Servers in the DMZ will use other internet connection (having vpn)

Please advise,,