Solved

Cisco Asa Multiple Customers

Posted on 2014-10-29
1
200 Views
Last Modified: 2015-01-12
Hello,

We have a cisco asa 5505.   I just learned that we need to provide internet service to a second party that wants to host their own firewall in a remote location .  The remote location I have several fiber runs to.  Since all our external ips come into the asa, Im going to assign a port on our 5505 to our vlan associated with our ISP.  From there Im going to give the second company a /21 block.

My concern is they would also like to keep equipment in our location on their local lan.  So off our asa I will connect to a switch (layer 3 I believe)  that switch will fiber connect to the second parties switch.  the second party will plug in their sonicwall to the remote switch.  In order to have local equipment in the same location as the asa Im guessing they have to create a vlan on the local and remote switch and sonicwall?
0
Comment
Question by:silvercas
1 Comment
 
LVL 62

Accepted Solution

by:
gheist earned 500 total points
ID: 40412858
/21 is very generous
Double the number of people should suffice ofr all the needs.
You can make virtual firewall in ASA and hand over management to them. It is very handy for customer to have control over other end of link
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Port 808 is being blocked 9 99
new cisco 3750 switch setup 2 27
WLC 5508 controller configuration 4 77
Cisco 5508 WLC software upgrade 2 37
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question