Solved

Configure CISCO ASA 5510 to use multiple Internet connections

Posted on 2013-12-05
5
2,364 Views
Last Modified: 2013-12-17
Could someone please let me know whether the CISCO ASA 5510 appliance can be configured to route Internet bound traffic through multiple Internet routers based on source IP address.

We have a requirement where a production server requires it's own dedicated Internet connection and wanted to avoid having to purchase an additional firewall.

If it helps, we are currently only using three of the four Ethernet interfaces.

A quick response would be very much appreciated.

Thank you.
0
Comment
Question by:bestway_it
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:Henk van Achterberg
Comment Utility
you can look at different security contexts to split up the ASA.

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808d2b63.shtml

Some features will be disabled though!
0
 

Author Comment

by:bestway_it
Comment Utility
Hello Henkva,

Would we need to purchase any additional licenses to configure multiple security contexts?
0
 

Author Comment

by:bestway_it
Comment Utility
The comparison table at the following link suggests that the Multiple Mode does not support VPN access.

I have also found the answer to the additional license question on the same page. My understanding is that by Default we can create two security contexts without the need of purchasing any additional licenses.

http://www.ciscopress.com/articles/article.asp?p=426641

We currently use our ASA as a VPN server therefore am I correct in understanding that it will be either VPN access or Multiple Mode.

Thank you.
0
 
LVL 12

Accepted Solution

by:
Henk van Achterberg earned 50 total points
Comment Utility
0
 

Author Closing Comment

by:bestway_it
Comment Utility
Hello,

For the sake of ease, we have decided to purchase a dedicated firewall.

Thank you for your assistance though.

Regards,
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

From Cisco ASA version 8.3, the Network Address Translation (NAT) configuration has been completely redesigned and it may be helpful to have the syntax configuration for both at a glance. You may as well want to read official Cisco published AS…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now