ASA 5505 config with multiple WAN IPs

Posted on 2010-08-30
Last Modified: 2012-08-05
I would like to replace our watchguard filewalls with Cisco ASAs.  What is the capability of multiple public IP addresses?  I have a block of 6 that I have setup on the WatchGuard box, and they are all bound to the external NIC and are configured to route to different internal servers/services.  I did try to configure an ASA 5510 at another site in a similar manor.  I had port 0 ast the main wan connection, then I tried to configure port 1 with the next public IP in our range, and it told me I could not have the 2nd IP, the subnet range overlapped.  So, is there an easy way to assign more then one public IP to the ports on the ASA like the WatchGuard?
Thanks - Wayne
Question by:wspjones99

Assisted Solution

ffleisma earned 150 total points
ID: 33560747
its not a problem with assigning two or more public IP for the ASA, it can handle having multiple public IP address. The problem you encountered is having two interfaces on the same subnet, hence the ASA didn't allow it.

having 1 ISP, though you have 6 public ip addresses, all of those are within the same subnet. Just considered it like configuring a router, you can't place two interfaces on the same subnet.

now, considering your requirement, can you further explain why you need to map you 6 public ip address on the ASA? can you explain the setup you wish to accomplish? be glad to help you out

hope this helps :-)
LVL 17

Expert Comment

ID: 33560900
The ASA supports "dual isp" with SLA route tracking. That means that you get a redundant outbound internet-connection since the ASA tracks the primary ISP. If it fails the default route will be removed and the "secondary" default route pointing to the secondary ISP will become active.

But this is only for outbound traffic, since you cannot "move" your public ip:s from one ISP-connection to another without the use of BGP which the ASA doesnt support.

More info:


Assisted Solution

Zupreme earned 150 total points
ID: 33561061
This is very easy to do with a Cisco ASA.

Just configure one interface IP and configure the other IP addresses as static entries.

You can read more about configuring static entries on an ASA here:
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

LVL 17

Accepted Solution

Kvistofta earned 200 total points
ID: 33561154
Just to clearify Zupremes comment:

You only put one ip-address of the public range onto the outside interface. Lets say that you have which gives you ip .1 to .14 to use and the ISP uses .15:

interface e0/0
 nameif outside
 security-level 0
 ip address

If you wanna allow inbound www-traffic to internal hosts and behind and respective you do like this:

static (inside,outside)

static (inside,outside)

access-list acl_outside ext permit tcp any host eq www
access-list acl_outside ext permit tcp any host eq www
access-group acl_outside in interface outside

For each public IP you want to translate inbound you just add a static and allow the traffic in the outside acl. In Cisco-world you dont assign those extra addresses to the outside interface like you do with some other vendors.



Author Comment

ID: 33561570
Hi ffleisma,
We are trying to the ASA for the following:
1. SSL and outlook over the internet going to mail.domain.local
2. Cisco SSL vpn client
3. Sharepoint to sharepoint.domain.local
I am not sure if the exchange box and the sharepoint box need separate wan IP addresses due to port 80.
I got around the OWA/ smart phone SSL issue by assigning port 444 for the SSL vpn client, using the same public IP for both.  But what I would like to do is use three of the public ip addresses, one for exchange, one for sharepoint, and one for the cisco SSL vpn.  In the watchGuard box it is fairly simple to add a second, third, etc.. public IP to the wan NIC and then setup the port mappings to the separate lan IPs.  I am proposing to replace the WatchGuard box with a cisco ASA, and want to be sure we can support what is already setup.
Clear as mud huh?
Thanks - Wayne
Thanks - Wayne
LVL 17

Expert Comment

ID: 33561598
It is totally clear. Just do what I wrote above and you will be home free!


Author Comment

ID: 33561860
That was what I was looking for!

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

There are many useful and sometimes not well documented or forgotten IOS or ASA/PIX commands. See IPE article here , there was also one on PacketU and on Cisco Tips & Tricks. Below are my favorites. I give also a few most often used for Cisco IPS an…
I recently updated from an old PIX platform to the new ASA platform.  While upgrading, I was tremendously confused about how the VPN and AnyConnect licensing works.  It turns out that the ASA has 3 different VPN licensing schemes. "site-to-site" …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now