Multi Gateway config with Cisco ASA

Dear expert

This is our network structure:
Internet -> Site A ( with gateway Cisco ASA 5505
Internet -> Site B ( with gateway Juniper Firewall

I can access the site A and B if I am switch  gateway ip, this means: if connecting to A i need to have gateway ip:, if B I need to have

However I want this: the Cisco can access both A and B, this is not working, I tried add a route, and added the ACL and added access rules for it, but still not working.

I tried to ping site B when im on the gateway on Cisco I got error from log:
The adaptive security appliance denied any inbound ICMP packet access. By default, all ICMP packets are denied access unless specifically allowed.

I checked around and saw you need to add ACL rules in Cisco, but I did... I dont know what is the problem.

Any idea?
Who is Participating?

Improve company productivity with a Business Account.Sign Up

arnoldConnect With a Mentor Commented:
if both are in without a "weight" that means that one packet can be directed to while the other to which is what a load-balancing setup would look like.

the difficulty deals with the definition of the ports to which the connection between the ASA and Juniper is set at.

The juniper inter-connecting speed from 100MB to 1GB?

Are you trying to setup a VPN to the ASA such that your VPN'ed remote will be able to access both segments?  In this case your VPN remote setup must NAT the connection such that access from the VPN assigned IP for example will appear to the juniper as originating from the (the ASA router)
Otherwise, the VPN assigned IP does not match the VPN between the Junipers which is to
The VPN IP originating packet will get to the first Juniper and since it will fail to match the allowable VPN traffic pattern, it will be dropped on the first juniper.  Even if through a misconfiguration, it will enter the tunnel, it will be dropped on the other side.  Even if through a misconfiguration on both junipers, the packet actually reaches the destination system on the other end.  The response will end up in a drop state, or even if ............
You need to establish a VPN connection, IPSec site to site where
Each firewall will have IP segment is accessible via the VPN tunnel

The same is true on the other side.

Remote gateway: publicIPsiteB
Local segment
Remote segment:

Remote gateway publicIPA
Local segment
Remote segment

When the tunnel is established.

Sitea system trying to access will have the packets routed to the ASA The destination and the source IP will match the VPN routing rule at which point these packets will be encrypted and sent through the VPN to the juniper.  Upon receipt of the packet. The destination and the source will be evaluated to make sure they meet the VPN policy on the receiving end at which point the packet with the source of and destination will be allowed into the LAN on the way to The service will then process the request and send a reply with the source of and destination of it will of course include other required TCP data that deals with maintaing state.   The packet on its way back undergoes similar evaluation process.

Depending on the proximate of the two devices, you could establish a home run link (cross cable) using a /30 network I.e.
Cisco asa interface 3
Junioer interface 3

You can setup ACLs that will route approved ACL access to via
And on the other device

You could also use dynamic OSPF/RIP to share which networks are accessible via this link.

You can have IP route interface1 weight1
IP route interface2 weight2

When the two are equal, it has a load balancing behavior as both are equal.
If one is lower than the other (failover setup), the lower is the one with the higher preference and through which all traffic will be sent while the other is the backup.
Using interfaces makes the routing table reliant on the referenced interface being UP.
When the interface drops, the routing entry goes away until the interface comes back up.
Handersson75Author Commented:
Thx for the answer, i dont think i need a vpn connection there because the site B gateway is on site A, in site B we already have a vpn tunnel setup... Ok i was unclear of this setting and i will re draw it:

Internet -> Site A ( with gateway Cisco ASA 5505
Internet -> Site A ( with gateway Juniper Firewall
VPN tunnel between here.
Internet -> Site B ( with gateway Juniper Firewall

There its more clear, the site A got two gateway, Site B got one gateway. Those Juniper Firewall got no problem at communicate with each other, from site B we could only communicate with the Site A if the gateway is:, not if gateway is

What I want is to make the Communication works for site A in to communicate with site B.

Turn Raw Data into a Real Career

There’s a growing demand for qualified analysts who can make sense of Big Data. With an MS in Data Analytics, you can become the data mining, management, mapping, and munging expert that today’s leading corporations desperately need.

Your VPN from siteb to each of the devices on sitea.

Could you draw a network diagram?

Your ACLs would need to reference siteb IP segments as trusted, or allowed for specific access.

The VPN if you only using one needs to include all IP segments for routing information.
Handersson75Author Commented:
Here is the drawing, I noticed I did a misstake of pre statement... Sorry about that, now its clear.
Where are you looking to get access from?

Are you trying to access siteb from cisco ?

Your IP addressing does not seem to be right.

It looks like cisco LAN, juniper wan and juniper lan for siteA are using the same segment.

Or is your juniper router configured in a transparent mode.

In order for the asa to access site B, it either has to learn the network route (network convergence through advertisement, rip, ospf) or a static route
Handersson75Author Commented:
Im trying to access site B using Cisco gateway yes. Juniper WAN is linked with Cisco, I dont know how the ISP have configed the Juniper but I think its in transparent mode? I have a static route to site B in Cisco tho... Or Site B cant event connect to Cisco at all.
What do you mean?

On the cisco the route should be pointing to the juniper on sitea not siteb. with
Not with

The traffic from site A must enter the VPN tunnel between site a juniper and site B juniper.

From the sound of it you have no control/access to the junipers.
Handersson75Author Commented:
that is correct, I have no Control/access to the Junipers because I could login there and set the speed to 1Gbit/s ISP didnt want me to do it of course. But I Heard from them that the Juniper work perfect fine there is no Connection blocking or setting problem, I need to Believe that and check if any problem on the Cisco...

As far as i can see I added 2 static route: with with

Both if in there, I know that the 250 will not work but it was just for the test.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.