<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Switch primary and backup ISP roles in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046637#M1067816</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; To prefer one ISP or the other, you play with the AD (Administrative Distance), not the metrics. If you have NAT enabled, when ISP fails, to avoid packet loss, use an EEM script to also clear your NAT table, look at example here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118049-config-eem-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118049-config-eem-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; If you have NAT configured into your ASA's outside interface for your public resources, you can leave that as it is, and all traffic in/out for those services would go out that ISP. If you want for your user's traffic (Internet access) to go via the second ISP, you make your default route to prefer the second ISP and configure NAT for your users out that interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Mar 2020 14:48:41 GMT</pubDate>
    <dc:creator>Cristian Matei</dc:creator>
    <dc:date>2020-03-16T14:48:41Z</dc:date>
    <item>
      <title>Switch primary and backup ISP roles</title>
      <link>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046593#M1067814</link>
      <description>&lt;P&gt;I recently setup a backup/fail-over ISP using this guide:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118962-configure-asa-00.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118962-configure-asa-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We now want to switch over to the backup ISP as the primary for all outgoing internet traffic. However we currently have several NATs setup for outside connections coming in over the current primary ISP, we would like to leave this setup as is so we don't have to re-address anything on the outside.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's the easiest way to accomplish this? Is it as simple as changing the metrics in the routing table to make the secondary ISP the primary route and &lt;SPAN&gt;vice versa?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 13:49:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046593#M1067814</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2020-03-16T13:49:11Z</dc:date>
    </item>
    <item>
      <title>Re: Switch primary and backup ISP roles</title>
      <link>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046637#M1067816</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; To prefer one ISP or the other, you play with the AD (Administrative Distance), not the metrics. If you have NAT enabled, when ISP fails, to avoid packet loss, use an EEM script to also clear your NAT table, look at example here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118049-config-eem-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118049-config-eem-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; If you have NAT configured into your ASA's outside interface for your public resources, you can leave that as it is, and all traffic in/out for those services would go out that ISP. If you want for your user's traffic (Internet access) to go via the second ISP, you make your default route to prefer the second ISP and configure NAT for your users out that interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 14:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046637#M1067816</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-16T14:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: Switch primary and backup ISP roles</title>
      <link>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046648#M1067818</link>
      <description>&lt;P&gt;Its hard if you have static NAT pointing outside to inside, If you rely on DNS, then you have new ISP Public IP also in your Public Manage DNS to Loadbalace.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for outgoing you can do with IPSLA Tracking and failover and clear the NAT table also.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;good discussion here :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/routing/nat-timeout-for-failover-w-dual-isps/td-p/2442121" target="_blank"&gt;https://community.cisco.com/t5/routing/nat-timeout-for-failover-w-dual-isps/td-p/2442121&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 14:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046648#M1067818</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-03-16T14:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: Switch primary and backup ISP roles</title>
      <link>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046701#M1067821</link>
      <description>&lt;P&gt;It just seems like it should be a easy change to accomplish this. The main NAT that's currently being utilized is a VPN Server that host 40-50 connections. Of course on the client end it's pointing to the outside IP (not DNS) of ISP1. That's why we thought it would be easier to just leave that setup the way it is and then just force all internal internet traffic out over ISP2. It would be a time consuming to change the IPs on all those VPN computers to the new ISP2 IP address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 15:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046701#M1067821</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2020-03-16T15:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Switch primary and backup ISP roles</title>
      <link>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046725#M1067822</link>
      <description>&lt;P&gt;Another Option if you would like to use other ISP, you can also PBR to route other traffic you like to use ISP 2&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 16:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-primary-and-backup-isp-roles/m-p/4046725#M1067822</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-03-16T16:30:32Z</dc:date>
    </item>
  </channel>
</rss>

