Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

To WAN connections and BGP peering on Cisco 3945 Routers

Posted on 2016-08-18
5
Medium Priority
?
61 Views
Last Modified: 2016-09-17
I'm moving into a new datacenter, and they are providing me two WAN links, with each WAN connection I get a separate /29 block, and I also get a /24 public IP block that will be advertised between the two connections.  Now I don't have my own ASN.  They said this is fine and we will just use a private ASN and do BGP peering, and a default route.

I have two Cisco 3945 routers - one router will connect to WAN link 1, and the other will connect to WAN link 2. See diagram below:

BGP.jpg
Can someone provide me with a sample configuration of what the BGP configuration on the routers would look like in my scenario.  Thanks.
0
Comment
Question by:denver218
  • 3
5 Comments
 
LVL 29

Expert Comment

by:Jan Springer
ID: 41761645
Are you set on this physical connection scheme and is it your plan to use one provider only and failing over to the other provider when there are problems with the first?
0
 
LVL 12

Expert Comment

by:Infamus
ID: 41764049
Just use OSPF if that's the private circuit between the two.

If you can provide /29 ip's I can write the command for you.
0
 
LVL 4

Author Comment

by:denver218
ID: 41774691
HI Jan,

Yes, everything will go out the primary, and the secondary is this scenario will only be used when the primary fails.
0
 
LVL 29

Accepted Solution

by:
Jan Springer earned 2000 total points (awarded by participants)
ID: 41774708
What I would suggest is that you cross connect the ASAs (required if you want failover)

If your switches aren't stacked, they either should be or you will need to put a cross connect cable between the switches, use VRRP and dual connections from both ASAs to both switches.

Connect both ASAs connect to both switches.

Use IP SLA and tracking on the ASAs -- that will failover the providers.  The cross connect cable between the ASAs will handle the firewall failover.

Unless by "failover" you want to automagically move the default route your inside devices use when one path or ASA fails.
0
 
LVL 29

Expert Comment

by:Jan Springer
ID: 41802882
This is the best way to ensure failover through all devices.
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For months I had no idea how to 'discover' the IP address of the other end of a link (without asking someone who knows), and it drove me batty. Think about it. You can't use Cisco Discovery Protocol (CDP) because it's not implemented on the ASAs.…
During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question