<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec Tunnel Redundancy Solution in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696558#M12652</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you considering a scenario wherein you have dual ISP and you wish to fall back to second ISP for vpn tunnel if the primary ISP fails, then yes it is possible:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It will be similar to :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979" target="_blank"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any other specific failure scenario in mind, please let us know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
    <pubDate>Tue, 28 Aug 2018 20:56:32 GMT</pubDate>
    <dc:creator>Ajay Saini</dc:creator>
    <dc:date>2018-08-28T20:56:32Z</dc:date>
    <item>
      <title>IPSec Tunnel Redundancy Solution</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696441#M12649</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We currently have a pair of&amp;nbsp;ASA 5510 configured in a failver. We have a Site-To-Site IPSec VPN configured to a remote site. So, hardware-wise, we have a fail-over solution but not a logical one where if the IPSec tunnel were to fail then it would failover to another tunnel. Is there such solution? Are are any recommendations to mitigate IPSec Tunnel failures provided that the primary ASA and the link to the ISP are operational?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;~zK&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696441#M12649</guid>
      <dc:creator>zekebashi</dc:creator>
      <dc:date>2020-02-21T16:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel Redundancy Solution</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696556#M12650</link>
      <description>Hi,&lt;BR /&gt;You can define a backup peer ip address on the crypto map, which would only be used if the first peer ip address is down. E.g. - "crypto map CRYPTO_MAP 5 set peer 1.1.1.1 2.2.2.2"&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 28 Aug 2018 20:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696556#M12650</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-28T20:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel Redundancy Solution</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696558#M12652</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you considering a scenario wherein you have dual ISP and you wish to fall back to second ISP for vpn tunnel if the primary ISP fails, then yes it is possible:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It will be similar to :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979" target="_blank"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any other specific failure scenario in mind, please let us know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 20:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696558#M12652</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-08-28T20:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel Redundancy Solution</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696561#M12653</link>
      <description>&lt;P&gt;You may also be able to setup the firewalls in multiple context mode in an active/active state.&amp;nbsp; You could then build an IPSec&amp;nbsp;tunnel from each ASA through the two ISPs&amp;nbsp;and have both tunnels up at the same time.&amp;nbsp;Depending on your routing, you could send some traffic one way, and some traffic the other way. There are some caveats with multiple-contexts, such as you cannot have the same vlan between contexts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 21:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-redundancy-solution/m-p/3696561#M12653</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2018-08-28T21:01:50Z</dc:date>
    </item>
  </channel>
</rss>

