• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 591
  • Last Modified:

Cisco ASA - Interface for VPN Traffic

I have a Cisco ASA 5510 with 4 interfaces. I am using one as my outside, one as my inside, one for internal wireless guests. I have an extra that i would like to use for my VPN traffic so that it does not touch my outside interface. I have a block of 16 public ip's. One is assigned to my outside interface already. I want to apply a different addy to my VPN interface. The asa throws up an error when trying to configure an ip address because it overlaps with the outside interface subnet.
Can you give me direction on how i can make this happen?
0
bcrosby007
Asked:
bcrosby007
  • 2
1 Solution
 
fgasimzadeCommented:
I dont think it is possible, it can create routing and security issues
0
 
rauenpcCommented:
fgasimzade is correct, this cannot be done as far as I've ever seen.
0
 
bcrosby007Author Commented:
So the only legit way would be to get another internet connection with it's own public ip/ gateway.
0
 
rauenpcCommented:
You would also need a separate ASA. Even with a separate public IP/gateway, the ASA can only have one active default route, so only one ISP can be in use at a time. There are some ways of using NAT to have multiple ISP's active at the same time, but for VPN purposes (which doesn't involve NAT) this cannot be done.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now