<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246103#M1118704</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1620299"&gt;@Youreateapot418&lt;/a&gt; the DC side (the ASA with 2 ISPs) would still establish a tunnel to the same IP address of the spoke ASA (the ASA with 1 isp), so having different PSKs would not work in this scenario. Certificates are stronger if you are concerned about security.&lt;/P&gt;</description>
    <pubDate>Sun, 12 Jan 2025 12:49:18 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2025-01-12T12:49:18Z</dc:date>
    <item>
      <title>Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246084#M1118690</link>
      <description>&lt;P&gt;Like the title says, I am looking to setup a connection to an endpoint, but, with connectivity via 2 x IKEv2 tunnels (I've only even done single tunnels).&amp;nbsp;&lt;/P&gt;&lt;P&gt;It appears to me that if we set them up in paralell, we would run into all sorts of NAT issues etc... (all same networks and setting, just 2 independent tunnels).&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnels will be in primary and secondary setup (i.e. only one used at a time).&lt;/P&gt;&lt;P&gt;When searching documents on it, I keep getting dragged into VPN client setups, I want site to site VPN tunnels.&lt;/P&gt;&lt;P&gt;Also, I have been advised this can be done in tunnels groups and crypto maps, but not sure how.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice or links greatly appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atunnels.png" style="width: 760px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237394i64BBF717CBF7149F/image-size/large?v=v2&amp;amp;px=999" role="button" title="atunnels.png" alt="atunnels.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 11:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246084#M1118690</guid>
      <dc:creator>Youreateapot418</dc:creator>
      <dc:date>2025-01-12T11:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246085#M1118691</link>
      <description>&lt;P&gt;You use VTI or policy based VPN?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 11:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246085#M1118691</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-12T11:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246086#M1118692</link>
      <description>&lt;P&gt;I haven't tried anything, as I don't even know where to start.... like I mentioned, single tunnels, fine with.... two parallell, no idea?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Working in ASDM too, so not a CLI specialist on the ASA's.&lt;/P&gt;&lt;P&gt;Do I just setup 2x tunnels as normal and link them together with VTI or policy based VPN ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will have a look into those two points (never used them, again, new to ASA's, first time being asked to do anything complicated).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 11:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246086#M1118692</guid>
      <dc:creator>Youreateapot418</dc:creator>
      <dc:date>2025-01-12T11:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246087#M1118693</link>
      <description>&lt;P&gt;You need to use vti in both sides&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And use BGP to prefer one path than other.&lt;/P&gt;
&lt;P&gt;That all what you need&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 11:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246087#M1118693</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-12T11:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246088#M1118694</link>
      <description>&lt;P&gt;Looking at VTI.... this looks interesting... we use crypto maps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I basically build 2 tunnels normally using VTI, then I can just static route out to whichever tunnel and weight the primary so it's primarily selected?&lt;/P&gt;&lt;P&gt;Apologies again, all new to me, I don't even know the relevant terminology.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 11:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246088#M1118694</guid>
      <dc:creator>Youreateapot418</dc:creator>
      <dc:date>2025-01-12T11:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246089#M1118695</link>
      <description>&lt;P&gt;both replying at the same time &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Will look at the far end peering via BGP also (they currently don't)&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you meant VTI on both sides, it that between ASA and ISP1, then ASA and ISP2... or just configure on the ASA side for both tunnels?&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:00:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246089#M1118695</guid>
      <dc:creator>Youreateapot418</dc:creator>
      <dc:date>2025-01-12T12:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246090#M1118696</link>
      <description>&lt;P&gt;You can use static route and weight it via one vti' but I prefer bgp it more fast and easy for failover if vti is down.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246090#M1118696</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-12T12:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246091#M1118697</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/212478-configure-asa-virtual-tunnel-interfaces.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/212478-configure-asa-virtual-tunnel-interfaces.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246091#M1118697</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-12T12:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246093#M1118698</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1620299"&gt;@Youreateapot418&lt;/a&gt; the most elegant solution is to use VTI's with a routing protocol, but you can achieve the samething using crypto maps. On the spoke you define two peers, when the primary tunnel fails the ASA will failover to the secondary tunnel.&lt;/P&gt;
&lt;PRE&gt;crypto map CMAP 1 set peer &amp;lt;primary ip&amp;gt; &amp;lt;secondary ip&amp;gt;&lt;/PRE&gt;
&lt;P&gt;If you wish to fail back to the primary VPN tunnel when it is backup, you can use preempt. &lt;A href="https://integrate.uk.com/asa-vpn-preempt/" target="_blank"&gt;https://integrate.uk.com/asa-vpn-preempt/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246093#M1118698</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-12T12:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246094#M1118699</link>
      <description>&lt;P&gt;Thank you, will look into both options!&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, thank you for the doc link !&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246094#M1118699</guid>
      <dc:creator>Youreateapot418</dc:creator>
      <dc:date>2025-01-12T12:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246095#M1118700</link>
      <description>&lt;P&gt;Friend you are welcome&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:13:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246095#M1118700</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-12T12:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246097#M1118701</link>
      <description>&lt;P&gt;Thanks Rob, I will look into this also! I'll be kicking myself if it's as simple as building a second tunnel separately, and just adding the secondary IP into Tunnel 1's crypto map.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246097#M1118701</guid>
      <dc:creator>Youreateapot418</dc:creator>
      <dc:date>2025-01-12T12:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246098#M1118702</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1620299"&gt;@Youreateapot418&lt;/a&gt;&amp;nbsp;you don't build/configure a second tunnel, you add the secondary ip to the existing tunnel (on the spoke ASA). If the tunnel vis the primary goes down, it attempts to re-establish the tunnel but to the secondary IP.&lt;/P&gt;
&lt;P&gt;You will also have the configure the routing on the DC side with the 2 ISP links, to failover routing if the primary link goes down.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:24:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246098#M1118702</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-12T12:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246100#M1118703</link>
      <description>&lt;P&gt;ah!&amp;nbsp;&lt;/P&gt;&lt;P&gt;can this tunnel have a different key also, or does it need to be the same? (there doesn't appear to be an option for this in ASDM, so probably have to do it at CLI level)&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246100#M1118703</guid>
      <dc:creator>Youreateapot418</dc:creator>
      <dc:date>2025-01-12T12:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246103#M1118704</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1620299"&gt;@Youreateapot418&lt;/a&gt; the DC side (the ASA with 2 ISPs) would still establish a tunnel to the same IP address of the spoke ASA (the ASA with 1 isp), so having different PSKs would not work in this scenario. Certificates are stronger if you are concerned about security.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246103#M1118704</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-12T12:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246106#M1118705</link>
      <description>&lt;P&gt;That makes sense, and also makes sense as to why I don't see any further options in ASDM.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;... will get onto labbing up the above solutions and see what works best with our setup.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 12:58:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246106#M1118705</guid>
      <dc:creator>Youreateapot418</dc:creator>
      <dc:date>2025-01-12T12:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: Single ASA connects to end point via 2 separate IKEv2 s2s tunnels</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246188#M1118706</link>
      <description>&lt;P&gt;if you establish two crypto map sequences, the 2nd one will never get matched, as it is a first match.. like others said you can define 2 peers on the same crypto map and it will detect failure and failover. To be honest, that is a bit clunky, and i would really suggest you take the time to do a VTI based - which is route based to failover. It is not that difficult. Ping here if you need help..&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2025 18:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-connects-to-end-point-via-2-separate-ikev2-s2s/m-p/5246188#M1118706</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2025-01-12T18:50:10Z</dc:date>
    </item>
  </channel>
</rss>

