ASA 5505 config with multiple WAN IPs

Posted on 2010-08-30
Last Modified: 2012-08-05
I would like to replace our watchguard filewalls with Cisco ASAs.  What is the capability of multiple public IP addresses?  I have a block of 6 that I have setup on the WatchGuard box, and they are all bound to the external NIC and are configured to route to different internal servers/services.  I did try to configure an ASA 5510 at another site in a similar manor.  I had port 0 ast the main wan connection, then I tried to configure port 1 with the next public IP in our range, and it told me I could not have the 2nd IP, the subnet range overlapped.  So, is there an easy way to assign more then one public IP to the ports on the ASA like the WatchGuard?
Thanks - Wayne
Question by:wspjones99

Assisted Solution

ffleisma earned 150 total points
ID: 33560747
its not a problem with assigning two or more public IP for the ASA, it can handle having multiple public IP address. The problem you encountered is having two interfaces on the same subnet, hence the ASA didn't allow it.

having 1 ISP, though you have 6 public ip addresses, all of those are within the same subnet. Just considered it like configuring a router, you can't place two interfaces on the same subnet.

now, considering your requirement, can you further explain why you need to map you 6 public ip address on the ASA? can you explain the setup you wish to accomplish? be glad to help you out

hope this helps :-)
LVL 17

Expert Comment

ID: 33560900
The ASA supports "dual isp" with SLA route tracking. That means that you get a redundant outbound internet-connection since the ASA tracks the primary ISP. If it fails the default route will be removed and the "secondary" default route pointing to the secondary ISP will become active.

But this is only for outbound traffic, since you cannot "move" your public ip:s from one ISP-connection to another without the use of BGP which the ASA doesnt support.

More info:


Assisted Solution

Zupreme earned 150 total points
ID: 33561061
This is very easy to do with a Cisco ASA.

Just configure one interface IP and configure the other IP addresses as static entries.

You can read more about configuring static entries on an ASA here:
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

LVL 17

Accepted Solution

Kvistofta earned 200 total points
ID: 33561154
Just to clearify Zupremes comment:

You only put one ip-address of the public range onto the outside interface. Lets say that you have which gives you ip .1 to .14 to use and the ISP uses .15:

interface e0/0
 nameif outside
 security-level 0
 ip address

If you wanna allow inbound www-traffic to internal hosts and behind and respective you do like this:

static (inside,outside)

static (inside,outside)

access-list acl_outside ext permit tcp any host eq www
access-list acl_outside ext permit tcp any host eq www
access-group acl_outside in interface outside

For each public IP you want to translate inbound you just add a static and allow the traffic in the outside acl. In Cisco-world you dont assign those extra addresses to the outside interface like you do with some other vendors.



Author Comment

ID: 33561570
Hi ffleisma,
We are trying to the ASA for the following:
1. SSL and outlook over the internet going to mail.domain.local
2. Cisco SSL vpn client
3. Sharepoint to sharepoint.domain.local
I am not sure if the exchange box and the sharepoint box need separate wan IP addresses due to port 80.
I got around the OWA/ smart phone SSL issue by assigning port 444 for the SSL vpn client, using the same public IP for both.  But what I would like to do is use three of the public ip addresses, one for exchange, one for sharepoint, and one for the cisco SSL vpn.  In the watchGuard box it is fairly simple to add a second, third, etc.. public IP to the wan NIC and then setup the port mappings to the separate lan IPs.  I am proposing to replace the WatchGuard box with a cisco ASA, and want to be sure we can support what is already setup.
Clear as mud huh?
Thanks - Wayne
Thanks - Wayne
LVL 17

Expert Comment

ID: 33561598
It is totally clear. Just do what I wrote above and you will be home free!


Author Comment

ID: 33561860
That was what I was looking for!

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

When I upgraded my ASA 8.2 to 8.3, I realized that my nonat statement was failing!   The log showed the following error:     %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows It was caused by the config upgrade, because t…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now