Cisco router internet traffic split

Dear experts,

I need to figure a rule that can make all internet traffic for users go in dedicated gateway.

We have 2 ISP we are not using one much want to put all Internet traffic there.

what are the steps to take.

HTTP/SSL rule with a entry on the routing table.

What else?

Thank youi
marceloNYCMiddle-Tier AdministratorAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Don JohnstonInstructorCommented:
Are both internet connections on a single router?  If so, what make/model router?

If not, a topology diagram would be helpful.
marceloNYCMiddle-Tier AdministratorAuthor Commented:
I think something like this is the solution.

Details to follow.
Don JohnstonInstructorCommented:
So you're saying both internet connections terminate on a single router and that router is a Cisco?

Then yes, that would be I suggestion. PBR with SLA for failover.
Determine the Perfect Price for Your IT Services

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden with our free interactive tool and use it to determine the right price for your IT services. Download your free eBook now!

marceloNYCMiddle-Tier AdministratorAuthor Commented:
We have:

LAN <--->Router <--> ASA <--> Internet.

Router entries:

ip route

interface GigabitEthernet0/0.10
 encapsulation dot1Q 10
 ip address secondary
 ip address secondary
 ip address <--- Our network affected with bandwidth shortage
 ip accounting access-violations
 ip pim dense-mode
 ip nat inside
 ip ospf authentication message-digest
 ip ospf message-digest-key 1 md5 7 00cccccccccccccccccccc543C
 ip ospf lls disable
 no cdp enable

Some ASA Entries:

interface Ethernet0/1
 nameif INSIDE
 security-level 100
 ip address
 ospf message-digest-key 1 md5 *****
 ospf authentication message-digest

global (OUTSIDE) 1 interface
global (DMZ) 1 interface
nat (INSIDE) 1
nat (INSIDE) 1

Someone started messing with Google drives and bandwidth shortage begin.

We have an unused ISP line 100 megs.
Don JohnstonInstructorCommented:
We have an unused ISP line 100 megs.
If that's connected to the ASA, then PBR and SLA will work.
marceloNYCMiddle-Tier AdministratorAuthor Commented:
No is not connected to the ASA I actually found a server running linux server as a firewall for that line. I can't connect to it..

Will dig up a ASA 5505 and replace... Still in the router I need to know what to do.
Don JohnstonInstructorCommented:
There's a fair amount of ambiguity here.

Where do (or will) the two internet links terminate?  Do they terminate on the same device?

Why are you replacing the ASA? Is it not working?
marceloNYCMiddle-Tier AdministratorAuthor Commented:

I m new here and walking into this things. I found that line going into a linux server. I ask what it was and learned is an unused Internet line with cox.

Apparently it was a second line... Not sure.

I want to use it because Internet traffic is so slow here. The users work with Google drives....

So since there an unused Internet line why not assign it for Internet traffic.
Don JohnstonInstructorCommented:
I understand that.  

But you said that it's terminated on a Linux firewall.  Then you say that you need to get an ASA replacement. Which makes it sound like you're going to have two separate ASA's.

And there's a router between the LAN and the existing ASA.  Is there something else connected to the router?  If not, it doesn't make any sense as to why the router is there.

And once again, where will the two internet links terminate?
marceloNYCMiddle-Tier AdministratorAuthor Commented:

The linux firewall no one knows how to connect to it. The person that left the company never document anything.

So I am going to replace with an ASA firewall.

So it will be LAN <---> Router <-- ASA 1/ ASA2

ASA2 for http/https traffic.
marceloNYCMiddle-Tier AdministratorAuthor Commented:
So i need the steps to get:

LAN <------> Internet using ASA2

I am all set now with ASA2.
Don JohnstonInstructorCommented:
Why do you have a router between the LAN and the ASA?

And you're going to connect the ASA's serially??? Meaning that traffic will go through the router, then the first ASA and then the second ASA?

Or will each internet link be connected to a different ASA?  If so, how will the ASA's connect to the LAN?  Through the router?
marceloNYCMiddle-Tier AdministratorAuthor Commented:
We are retail company and have a lot of other networks connecting here via VPN.

I think that is why was design this way.
Don JohnstonInstructorCommented:
You currently have:


and you're going to add an ASA like this?

                                                             ___ Internet1

Or are you doing this:
marceloNYCMiddle-Tier AdministratorAuthor Commented:
doing this:
marceloNYCMiddle-Tier AdministratorAuthor Commented:
I think we should configure our router to direct HTTP and HTTPS traffic through the ASA2.

access-list 100 permit tcp 0 any eq www
access-list 100 permit tcp any eq 443
access-list 101 permit ip any any

ip route (Cisco ASA)
ip route  ( ASA2)

Configuration Idea

With the access list HTTP/HTTPS traffic has to take the assigned gateway.

I am missing something for our network...
Don JohnstonInstructorCommented:

So you will be doing the PBR and SLA on the router and NAT on the ASA's, right?

Which means the configs on the link will work perfectly except that you will remove any references to NAT.  Other than that, you're good to go.
Don JohnstonInstructorCommented:
I'm doing this from memory, but this should be what you're looking for.

track 123 ip sla 1 reachability
track 234 ip sla 2 reachability
interface F0/0
 description Link to LAN
 ip address
 ip policy route-map alpha
interface f0/1
 description to ASA 1
 ip address y.y.y.y
interface f0/2
 description to ASA 2
 ip address x.x.x.x
ip route
ip route
ip route
ip access-list extended web-traffic (admin)
 permit tcp any eq 80
 permit tcp any eq 443
ip access-list extended non-web
 permit ip any
ip sla 1
 icmp-echo source-interface f0/1 (to ASA 1)
 timeout 1000
 frequency 3
ip sla schedule 1 life forever start-time now

ip sla 2
 icmp-echo source-interface f0/2 (to ASA 2)
 timeout 1000
 frequency 3
ip sla schedule 2 life forever start-time now

route-map alpha permit 10
 match ip address web-traffic
 set ip next-hop verify-availability y.y.y.z 10 track 123 !(ip address of ASA 1)
 set ip next-hop verify-availability x.x.x.z 20 track 234 !(ip address of ASA 2)
route-map alpha permit 20
 match ip address non-web
 set ip next-hop verify-availability x.x.x.z 10 track 234 !(ip address of ASA 2)
 set ip next-hop verify-availability y.y.y.z 20 track 123 !(ip address of ASA 1)

Open in new window

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
marceloNYCMiddle-Tier AdministratorAuthor Commented:
Sorry it took me so long to get back to you.

Thank you for your help.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.