<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This solution is not in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552484#M236980</link>
    <description>&lt;P&gt;This solution is not recommended but it is a way to get to the solution you want.&amp;nbsp; Keep in mind that by doing the following you will be creating a security risk.&lt;/P&gt;&lt;P&gt;You can configure TCP bypass on the ASA.&amp;nbsp; This will allow the ASA to perform asynchronous routing so that you can receive traffic on interface "outside" and then route the return traffic through "outside1".&amp;nbsp; TCP bypass tells the ASA to ignor the connection state of packets allowing asynchronous routing.&amp;nbsp; Please refer to the following link for more information and how to configure TCP bypass:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpstatebypass.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpstatebypass.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Tue, 09 Sep 2014 09:32:42 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-09-09T09:32:42Z</dc:date>
    <item>
      <title>ASA with two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552481#M236968</link>
      <description>&lt;P&gt;I have two ISPs but I don't want to setup a backup route I want to route all my internet traffic out the secondary outside interface but without losing the first outside interface because I have all of my static IP addresses on the first outside interface.&amp;nbsp; Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552481#M236968</guid>
      <dc:creator>nelson-rick</dc:creator>
      <dc:date>2019-03-12T04:24:30Z</dc:date>
    </item>
    <item>
      <title>Hi Nelson,Could you please</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552482#M236972</link>
      <description>&lt;P&gt;Hi Nelson,&lt;/P&gt;&lt;P&gt;Could you please provide the current configuration of the ASA (especially the routes configured in ASA).&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 06:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552482#M236972</guid>
      <dc:creator>Thomas Panicker</dc:creator>
      <dc:date>2014-07-01T06:40:48Z</dc:date>
    </item>
    <item>
      <title>sh run: Saved:ASA Version 8.4</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552483#M236975</link>
      <description>&lt;P&gt;sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(1)&lt;BR /&gt;!&lt;BR /&gt;hostname fw254&lt;BR /&gt;domain-name testnj.org&lt;BR /&gt;enable password ?? encrypted&lt;BR /&gt;passwd ?? encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.17.0.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2 (T1)&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address ??.??.??.98 255.255.255.240&lt;/P&gt;&lt;P&gt;interface vlan3 (CABLE MODEM)&lt;BR /&gt;&amp;nbsp;nameif outside1&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address ??.??.??.52 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa841-k8.bin&lt;BR /&gt;boot system disk0:/asa832-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name testnj.org&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_172.17.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 172.17.0.0 255.255.0.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.0.0_16&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object network NETWORK_OBJ_172.17.2.0_25&lt;BR /&gt;&amp;nbsp;subnet 172.17.2.0 255.255.255.128&lt;BR /&gt;object network NETWORK_OBJ_192.168.3.0_24&lt;BR /&gt;&amp;nbsp;subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object network te-test&lt;BR /&gt;&amp;nbsp;host 172.17.12.12&lt;BR /&gt;object network Barracuda&lt;BR /&gt;&amp;nbsp;host 172.17.8.17&lt;BR /&gt;&amp;nbsp;description Barracuda Spam Appliance &amp;nbsp;&lt;BR /&gt;object network EXCH-2010&lt;BR /&gt;&amp;nbsp;host 172.17.8.13&lt;BR /&gt;&amp;nbsp;description Exchange 2010 Server &amp;nbsp;&lt;BR /&gt;object network 192.168.4.0&lt;BR /&gt;&amp;nbsp;subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network 192.168.5.0&lt;BR /&gt;&amp;nbsp;subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network dex_Server&lt;BR /&gt;&amp;nbsp;host 172.17.8.14&lt;BR /&gt;object service RDP&lt;BR /&gt;&amp;nbsp;service tcp destination eq 3389&lt;BR /&gt;object-group service testRDP tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;&amp;nbsp;port-object eq 5389&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;port-object eq 6389&lt;BR /&gt;&amp;nbsp;port-object eq 8390&lt;BR /&gt;&amp;nbsp;port-object eq 8989&lt;BR /&gt;&amp;nbsp;port-object eq 8990&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 172.17.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;BR /&gt;access-list testVPNGroup_splitTunnelAcl standard permit 172.17.0.0 255.255.0.0&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 172.17.0.0 255.255.0.0 192.168.3.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Barracuda eq smtp&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Barracuda eq pop3&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Barracuda eq ssh&lt;BR /&gt;access-list outside_access_in extended permit tcp any object EXCH-2010 eq https&lt;BR /&gt;access-list outside_access_in extended permit tcp any object EXCH-2010 eq www&lt;BR /&gt;access-list outside_access_in extended permit object RDP any object dex_Server&lt;BR /&gt;access-list outside_access_in remark test RDP ports, close 3389 soon. GTR 5/14/2011&lt;BR /&gt;access-list outside_access_in extended permit tcp any object te-test object-group testRDP&lt;BR /&gt;access-list outside_access_in extended permit icmp any any inactive&lt;BR /&gt;access-list outside_access_in extended permit ip host ??.??.??.180 host ??.??.??.99 inactive&lt;BR /&gt;access-list testVPN_SplitTunACL remark test Internal Network River&lt;BR /&gt;access-list testVPN_SplitTunACL standard permit 172.17.0.0 255.255.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool ippool2 172.17.2.10-172.17.2.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-641.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_172.17.0.0_16 NETWORK_OBJ_172.17.0.0_16 destination static NETWORK_OBJ_192.168.0.0_16 NETWORK_OBJ_192.168.0.0_16&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_172.17.0.0_16 NETWORK_OBJ_172.17.0.0_16 destination static NETWORK_OBJ_172.17.2.0_25 NETWORK_OBJ_172.17.2.0_25&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_172.17.0.0_16 NETWORK_OBJ_172.17.0.0_16 destination static NETWORK_OBJ_192.168.3.0_24 NETWORK_OBJ_192.168.3.0_24&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network te-test&lt;BR /&gt;&amp;nbsp;nat (any,any) static ??.??.??.99&lt;BR /&gt;object network Barracuda&lt;BR /&gt;&amp;nbsp;nat (any,any) static ??.??.??.101&lt;BR /&gt;object network EXCH-2010&lt;BR /&gt;&amp;nbsp;nat (any,any) static ??.??.??.100&lt;BR /&gt;object network Munidex_Server&lt;BR /&gt;&amp;nbsp;nat (any,any) static ??.??.??.102&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ??.??.??.97 1&lt;BR /&gt;route outside1 0.0.0.0 0.0.0.0 ??.??.??.51 2&lt;BR /&gt;route inside 172.17.0.0 255.255.0.0 172.17.0.1 1&lt;BR /&gt;route inside 192.168.3.0 255.255.255.0 172.17.0.1 1&lt;BR /&gt;route inside 192.168.4.0 255.255.255.0 172.17.0.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route inside 192.168.5.0 255.255.255.0 172.17.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs&lt;BR /&gt;crypto map outside_map 1 set peer ??.210&lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set pfs&lt;BR /&gt;crypto map outside_map 2 set peer ??.114&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=fw254&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt;&amp;nbsp;certificate a487384d&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201c3 3082012c a0030201 020204a4 87384d30 0d06092a 864886f7 0d010105&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003026 310e300c 06035504 03130566 77323534 31143012 06092a86 4886f70d&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 01090216 05667732 3534301e 170d3131 30313231 32313435 31375a17 0d323130&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31313832 31343531 375a3026 310e300c 06035504 03130566 77323534 31143012&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 06092a86 4886f70d 01090216 05667732 35343081 9f300d06 092a8648 86f70d01&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 01010500 03818d00 30818902 818100a5 f386e796 0cee5ca0 d90533b8 2916ef91&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 222f0cc1 53d428ba f8c316e1 21d0c760 c2bc56e7 9ff3f56f dac6edf8 880f3842&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3ad84e2c 125e9e3c aef92304 f1ed4f55 9a832c78 73e60924 7af3c30d 2e73b0d4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; eba2b0b2 9c0d6438 0797dd48 1f62b04b 748ca2fe 7fde4d72 2b5ea87e ab223558&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1c4f1e9c e33ba9fd 3e5c68b5 719e6f02 03010001 300d0609 2a864886 f70d0101&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05050003 81810090 9353520d 8725797d 4fafc8dd d5f2702b 019158d6 038a23d9&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a675f0de b9c5e139 36946502 1aea3430 5c76773b 2a4e9b06 6bdb8850 e494dd79&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9b22f25e 6844557d 2b518c9f 4e42f428 90fc2d5b 9b5b0b93 fde76aad dc5cc146&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8a986e1f 115ed3ac 8e077cde 55b445f9 6b6232ab 5b28626d 8d9bd890 3e79d483&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15e28d11 d7b9e2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 5&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.17.0.150-172.17.0.175 inside&lt;BR /&gt;dhcpd dns 4.2.2.2 4.2.2.1 interface inside&lt;BR /&gt;dhcpd domain BoE-test.local interface inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 17.254.0.27 source outside prefer&lt;BR /&gt;webvpn&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;group-policy testVPNGroupPolicy internal&lt;BR /&gt;group-policy testVPNGroupPolicy attributes&lt;BR /&gt;&amp;nbsp;dns-server value 172.17.8.10 172.17.8.11&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value testVPN_SplitTunACL&lt;BR /&gt;group-policy testVPNGroup internal&lt;BR /&gt;group-policy testVPNGroup attributes&lt;BR /&gt;&amp;nbsp;wins-server value 4.2.2.1&lt;BR /&gt;&amp;nbsp;dns-server value 4.2.2.2&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value testVPNGroup_splitTunnelAcl&lt;BR /&gt;&amp;nbsp;default-domain value test.com&lt;BR /&gt;username edgefd password f8.apWxtIP/hKDsD encrypted&lt;BR /&gt;username edgefd attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username edgevpnuser3 password ?? encrypted privilege 0&lt;BR /&gt;username edgevpnuser3 attributes&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username edgevpnuser2 password ?? encrypted privilege 0&lt;BR /&gt;username edgevpnuser2 attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username vpnuser1 password ?? encrypted privilege 0&lt;BR /&gt;username vpnuser1 attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username MikeS password ?? encrypted&lt;BR /&gt;username MikeS attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username mikeb password ?? encrypted&lt;BR /&gt;username mikeb attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username gregf password ?? encrypted&lt;BR /&gt;username gregf attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username support password ?? encrypted&lt;BR /&gt;username support attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username testSupport password ??V encrypted privilege 0&lt;BR /&gt;username testSupport attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroup&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;username 3c password ?? encrypted privilege 15&lt;BR /&gt;username VOIPAdmin password ?? encrypted&lt;BR /&gt;username VOIPAdmin attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroup&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username tomq password 8w.fOfnulq35.YH6 encrypted&lt;BR /&gt;username tomq attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username thomasj password ?? encrypted&lt;BR /&gt;username thomasj attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy testVPNGroupPolicy&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;tunnel-group 67.154.126.210 type ipsec-l2l&lt;BR /&gt;tunnel-group 67.154.126.210 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group testVPNGroup type remote-access&lt;BR /&gt;tunnel-group testVPNGroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool ippool2&lt;BR /&gt;&amp;nbsp;default-group-policy testVPNGroup&lt;BR /&gt;tunnel-group testVPNGroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group ??.??.??.114 type ipsec-l2l&lt;BR /&gt;tunnel-group ??.??.??.114 ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group testTunnelGroup type remote-access&lt;BR /&gt;tunnel-group testTunnelGroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool ippool2&lt;BR /&gt;&amp;nbsp;authorization-server-group LOCAL&lt;BR /&gt;&amp;nbsp;default-group-policy testVPNGroupPolicy&lt;BR /&gt;tunnel-group testTunnelGroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map global&lt;BR /&gt;class-map inspection-default&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; inspect dns&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:db60cb0da92371c17771b2fb8f576f18&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;fw254#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2014 00:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552483#M236975</guid>
      <dc:creator>nelson-rick</dc:creator>
      <dc:date>2014-07-02T00:00:03Z</dc:date>
    </item>
    <item>
      <title>This solution is not</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552484#M236980</link>
      <description>&lt;P&gt;This solution is not recommended but it is a way to get to the solution you want.&amp;nbsp; Keep in mind that by doing the following you will be creating a security risk.&lt;/P&gt;&lt;P&gt;You can configure TCP bypass on the ASA.&amp;nbsp; This will allow the ASA to perform asynchronous routing so that you can receive traffic on interface "outside" and then route the return traffic through "outside1".&amp;nbsp; TCP bypass tells the ASA to ignor the connection state of packets allowing asynchronous routing.&amp;nbsp; Please refer to the following link for more information and how to configure TCP bypass:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpstatebypass.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpstatebypass.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 09:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-two-isps/m-p/2552484#M236980</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-09T09:32:42Z</dc:date>
    </item>
  </channel>
</rss>

