2 external Interfaces with static IPs from different providers.
one connects with the routed DMZ-Subnet - shuod be routed in the future and
one for surfing / must be masqueraded because the dmz-subnet is not reacheble over this ISP
i have static IPs from ISP1 and ISP2. The DMZ has an additional Supnet from ISP1.
we masquerade the local-lan at FW2 (FW2 has an public IP from ISP1 at the DMZ-Intrface)
because the FW2, the MailExchanger and some other services reside within the dmz they must comunicate with their public IPs from ISP1.
Surfing and some ohter services shoud use ISP2. With the current version i can not say the proxy have to use ISP2 (see other thread).
The DMZ-Subnet is not routeble over ISP2! So i have to masquerade outgoing traffic from the ISP2-Interface.
Some ideas?
Thanks dirk
You have public IPs (I assume "supnet" means subnet) from ISP1 in your DMZ, but you want them to communicate with the world through ISP2? I'm sorry, you provide some details, but it's not clear at all what's going on on your network.
Hi all,
at the moment i try to configure link balancing with 2 ISPs - but i can use only one link.
the network diagram are not to understand?
ISP1 --- ASTARO7.402 ---- DMZ --- FW2 ---- LAN
ISP2 ----'
.. ok
I have two ISP links from different ISPs. These terminating at the ASTARO FW. behind the ASTARO i have the DMZ. These have an IP-Subnet from Provider 1, many devices and are routeble over the ISP1-Link.
the next is the FireWall2. One interface has an IP-Adress from the DMZ-Subnet (routeble from ISP1). To this interface the internal LAN behind the Firewall2 masqueraded.
The ASTAO shoud send HTML-Traffic to ISP2.
but ... the visible source-address of this traffic are from ISP1 - i can´t send this traffic over ISP2 without masquerading. traffic over ISP1 shoud not be masqueraded!
Mail-, WEB-Security Subsctiptions and the count of interfaces are different from system to system.
To masquerade traffic that goes out over ISP2, you add a masquerading rule under "Network Security » NAT" that looks like: - Network: Any - Interface: ISP2
To masquerade traffic that goes out over ISP2, you add a masquerading rule under "Network Security » NAT" that looks like: - Network: Any - Interface: ISP2
Dirk, It sounds like all you want the Astaro to do is WAN uplink balancing, and nothing else. I don't know for a fact, but I don't think bridge mode is compatible with uplink balancing.
I'm not trying to be a Trottel, but it's just impossible to help you if you don't provide a clear picture of the situation. Please read the link I provided above to the article about getting help in venues like this one.
Network: Any should also work, because only traffic that is send out this interfaces is masqueraded. For the public IPs from ISP1 this is what you want, but for all other traffic (if there is any) this can also do no harm. Your rule is more specific.