Thanks for the reply. The 16 public IP are bound to the public interface of the BM server. However, the BM server routes traffic to our Cisco 2811 which has two public interfaces, one pointing to ISP1 and the other pointing to ISP2. Default routes have all traffic going to ISP1 like the following:
mail server is a secondary address on the BM public interface with ip of x.y.z.3. The default route point all traffic to x.y.z.1 which is the IP address of our serial0/0/0 going to ISP1. So the hops would be x.y.z.3 → x.y.z.1 → ISP1 or vise versa for inbound initiated traffic. This is NOT nat’ed.
Now, in the event of failure of serial0/0/0 to ISP1, the route would be x.y.z.3 → a.b.c.86 → ISP2 via cable. Since we only have the one static IP for the cable connection, this would have to be nat’ed. With a nat we can’t do the reverse which would be ISP2 → a.b.c.86 → a.b.c.85 (cable modem) → x.y.z.2 (or 3 or 4 etc) for inbound initiated traffic. This where I get really confused.
[color=blue][color=green][color=darkred]
KBOYLEKBOYLE@no-mx.forums.novell.com 3/27/2013 1:11 PM >>>
[/color][/color][/color]
Chris wrote:
[color=blue]
Now here is the problem, when traffic leaves Border Manager, it is
coming from our static IP (ISP1) as that is our primary carrier.
However, in the event of a failure, the traffic will shift over to
Comcast (ISP2) at the router level, but the packets will still be
coming from our BM server with an IP address associated with ISP1.
[/color]
I assume your LAN uses private IP addresses so outgoing packets will
always be assigned one of the public IP addresses associated with the
interface from which it leaves. I also assume you have rules to ensure
that packets arriving via ISP1 will be assigned the appropriate IP
address for the reply.
When you have two public interfaces, you have to ensure the reply is
sent from the same interface from which the original packet arrived
otherwise the source IP address will be different on the outgoing
packets and when returned to the source machine, it will not be
recognised as a valid reply.
If you have a failure affecting your ISP1 interface or your ISP1, you
won’t have any packets arriving from that interface so the issue with
having them returned via the ISP2 interface is not a concern.
Having a second ISP helps with traffic originating from your LAN. You
may create rules to direct web traffic to the interface with the
greater bandwidth, for example, and can direct all traffic to one
interface if the other one fails but it won’t help for in-bound traffic
associated with one specific IP address from your block of sixteen
static addresses. If you have an email server associated with IP
address x.x.x.6 and you lose connectivity with your ISP1, you will not
receive any incoming email but with appropriate rules outgoing email
could still be sent via ISP2.
To make any of this work your router will have two public interfaces
and appropriate routing rules. I don’t know whether BorderManager alone
can do the job, even with two public interfaces. You may need SLES with
SuSEfirewall or a separate router.
–
Kevin Boyle - Knowledge Partner
If you find this post helpful and are logged into the web interface,
show your appreciation and click on the star below…