Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cisco ASA behind pfSense firewall on VIP

    Scheduled Pinned Locked Moved HA/CARP/VIPs
    1 Posts 1 Posters 838 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      RudiMM
      last edited by

      Controls contractor insists they have their own VPN endpoint, a Cisco ASA.  Management has told us to make it work.  We have a smallish internet connection, so would prefer the pfSense already in place control the WAN link.  Is there a way to NAT one public address while passing through another to the ASA.  We have spare ports.  We know that a switch in front of both appliances is the easiest solution, but we loose control of the WAN bandwidth.  A second pfSense appliance in WAN-LAN bridge would also give us the control.  Looking for a possible single pfSense appliance solution.

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.