<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Out of curiosity, is this a in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522730#M237472</link>
    <description>Out of curiosity, is this a live setup or in a virtual lab?  Reason i ask is i set this up in GNS3 last night with pppoe and got the same results as you.
the ASA would not failover when the remote IP was unreachable even though debugging showed that the ICMP timed out. I am not sure why that happened and the only way i got the correct routes in the routing table was to shutdown the ASA interface.  Wish i had some physical ASA to lab this on to compaire, and rule out that this might be a virtual ASA limitation.  In any case i will give it another shot after work today.</description>
    <pubDate>Thu, 26 Jun 2014 05:35:15 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-06-26T05:35:15Z</dc:date>
    <item>
      <title>ISP Failover - Internet Access to ISP1 and VPN Traffic to ISP2</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522690#M237404</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Community.&lt;/P&gt;&lt;P&gt;I've successfully setup ISP Failover. Now all the traffic (internet and VPN) goes over ISP1 and if the connection fails to ISP1 it goes to ISP2.&lt;/P&gt;&lt;P&gt;But I like to have a different setup. All the internet traffic should go to ISP1 and all the VPN traffic should go to ISP2, but with Failover functionality.&lt;/P&gt;&lt;P&gt;That means. If ISP1 fails the internet traffic goes to ISP2. And if ISP2 fails the VPN Traffic goes to ISP1.&lt;/P&gt;&lt;P&gt;Is that possible ?&lt;/P&gt;&lt;P&gt;Best Regards patrick&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522690#M237404</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2019-03-12T04:21:16Z</dc:date>
    </item>
    <item>
      <title>Are we talking S2S VPN or RA</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522691#M237406</link>
      <description>&lt;P&gt;Are we talking S2S VPN or RA VPN?&lt;/P&gt;&lt;P&gt;Also, why would you want to the VPN over to ISP1 if ISP1 has failed?&lt;/P&gt;&lt;P&gt;But to answer your question...if it is an S2S VPN this is possible.&amp;nbsp; If it is an RA VPN this is not possible because you would need the use of a default route to be able to access the remote IPs.&amp;nbsp; But for site to site you can set a static route pointing out ISP2.&lt;/P&gt;&lt;P&gt;Now you would need two default routes and two static routes for the S2S VPN connection, the primary route would need a lower administrative distance than the secondary route.&amp;nbsp; Then you would configure an IP SLA tracking, one for the default route and one for the S2S VPN static route.&amp;nbsp; You would then assign the tracking to the route that you want active, once the tracking returns an unreachable or down response, that route will be removed from the routing table and the backup route will be installed in the routing table.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 11:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522691#M237406</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-20T11:52:47Z</dc:date>
    </item>
    <item>
      <title>Hi Marius.Yes i need it for</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522692#M237408</link>
      <description>&lt;P&gt;Hi Marius.&lt;/P&gt;&lt;P&gt;Yes i need it for S2S VPN. I did the config as you mentioned. But I hadn't luck.&lt;/P&gt;&lt;P&gt;See the config of my SLA and Routing:&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;route OUT1 0.0.0.0 0.0.0.0 212.12.12.12 1 track 1&lt;BR /&gt;route OUT1 33.33.33.33 255.255.255.255 212.12.12.12 254&lt;/P&gt;&lt;P&gt;route OUT2 33.33.33.33 255.255.255.255 211.11.11.9 1 track 2&lt;BR /&gt;route OUT2 0.0.0.0 0.0.0.0 211.11.11.9 254&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 8.8.8.8 interface OUT1&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;frequency 15&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;sla monitor 2&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 8.8.8.8 interface OUT2&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;frequency 10&lt;BR /&gt;sla monitor schedule 2 life forever start-time now&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;33.33.33.33 is the VPN Peer at the other end. 212.12.12.12 is the primary default route for Internet access and 211.11.11.9 is the primary default route for the VPN.&lt;/P&gt;&lt;P&gt;Did I something wrong ?&lt;/P&gt;&lt;P&gt;Hope you can help and best regards Patrick&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 07:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522692#M237408</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2014-06-24T07:22:07Z</dc:date>
    </item>
    <item>
      <title>You need to assign the SLA to</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522693#M237411</link>
      <description>&lt;P&gt;You need to assign the SLA to a track ID&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;track 1 rtr 1 reachability&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;track 2 rtr 2 reachability&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The format is:&lt;/P&gt;&lt;P&gt;track &amp;lt;track number&amp;gt; rtr &amp;lt;SLA number&amp;gt; reachability&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 07:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522693#M237411</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-24T07:30:58Z</dc:date>
    </item>
    <item>
      <title>I did that but forgot to post</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522694#M237414</link>
      <description>&lt;P&gt;I did that but forgot to post these 2 lines here. Is the rest of the config okay.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 07:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522694#M237414</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2014-06-24T07:45:24Z</dc:date>
    </item>
    <item>
      <title>The reason this isn't working</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522695#M237418</link>
      <description>&lt;P&gt;The reason this isn't working is because you are tracking 8.8.8.8 on interface OUT2 which is your secondary interface...your default route does not point out that interface.&amp;nbsp; I suggest you track an IP that you can configure a static route for which points out interface OUT2 and then test.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 07:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522695#M237418</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-24T07:51:52Z</dc:date>
    </item>
    <item>
      <title>Hi,This should be your</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522696#M237420</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This should be your complete planned configuration which looks okay for me.&lt;/P&gt;&lt;P&gt;route OUT1 0.0.0.0 0.0.0.0 212.12.12.12 1 track 1&lt;BR /&gt;route OUT1 33.33.33.33 255.255.255.255 212.12.12.12 254&lt;/P&gt;&lt;P&gt;route OUT2 33.33.33.33 255.255.255.255 211.11.11.9 1 track 2&lt;BR /&gt;route OUT2 0.0.0.0 0.0.0.0 211.11.11.9 254&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 8.8.8.8 interface OUT1&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;frequency 15&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;sla monitor 2&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 8.8.8.8 interface OUT2&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;frequency 10&lt;BR /&gt;sla monitor schedule 2 life forever start-time now&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 1 reachability&lt;BR /&gt;!&lt;BR /&gt;track 2 rtr 2 reachability&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But my suggestion would be to keep the respective gateway ip in track rather than keeping public dns(8.8.8.8). And you can also minimize the frequency time to do a quick fallback&amp;nbsp; in case of outage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 08:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522696#M237420</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-24T08:06:09Z</dc:date>
    </item>
    <item>
      <title>Hi Guys that was it. The</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522697#M237421</link>
      <description>&lt;P&gt;Hi Guys that was it. The routingis working now. I did as you metioned:&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 212.12.12.12 interface OUT1&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;frequency 15&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;sla monitor 2&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 211.11.11.9 interface OUT2&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;frequency 10&lt;BR /&gt;sla monitor schedule 2 life forever start-time now&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;The traceroute shows me now that the address 33.33.33.33 goes out the interface OUT2. But the VPn traffic still uses interface OUT1.&lt;/P&gt;&lt;P&gt;My crypto config:&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;access-list ALC_VPN extended permit ip object OBJ_INS1_NET_192_168_1 object 10.41.16.0_22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (INS1,OUT1) source static OBJ_INS1_NET_192_168_1 OBJ_INS1_NET_192_168_1 destination static 10.41.16.0_22 10.41.16.0_22 no-proxy-arp route-lookup&lt;BR /&gt;nat (INS1,OUT2) source static OBJ_INS1_NET_192_168_1 OBJ_INS1_NET_192_168_1 destination static 10.41.16.0_22 10.41.16.0_22 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map OUT1_MAP 100 match address ALC_VPN&lt;BR /&gt;crypto map OUT1_MAP 100 set pfs&lt;BR /&gt;crypto map OUT1_MAP 100 set peer 33.33.33.33&lt;BR /&gt;crypto map OUT1_MAP 100 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map OUT1_MAP interface OUT1&lt;BR /&gt;crypto map OUT1_MAP interface OUT2&lt;/P&gt;&lt;P&gt;crypto ikev1 enable OUT1&lt;BR /&gt;crypto ikev1 enable OUT2&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group 33.33.33.33 type ipsec-l2l&lt;BR /&gt;tunnel-group 33.33.33.33 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;-------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Hope you guys still like to help me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Best regards Patrick&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 08:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522697#M237421</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2014-06-24T08:41:41Z</dc:date>
    </item>
    <item>
      <title>The tunnel was most likely</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522698#M237422</link>
      <description>&lt;P&gt;The tunnel was most likely already established when you made these changes, you would need to tear down and and re-establish the VPN for it to point out the correct interface.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 08:46:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522698#M237422</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-24T08:46:05Z</dc:date>
    </item>
    <item>
      <title>Hi Patrick,I agree with</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522699#M237423</link>
      <description>&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;I agree with Marius for break the VPN connection and try again. But i have a quick question here... does your VPN peer IP belongs to the ISP1 IP Stack???&lt;/P&gt;&lt;P&gt;I doubt in that way.... Not sure about that....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 09:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522699#M237423</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-24T09:04:20Z</dc:date>
    </item>
    <item>
      <title>I did "clear crypto isakmp sa</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522700#M237424</link>
      <description>&lt;P&gt;I did "clear crypto isakmp sa" and reopened the tunnel. But still the same, VPN doesn't go out the Interface OUT2. But if i disconnectthe cable from OUT1, the VPN Tunnel goes out the Tunnel OUT2.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 09:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522700#M237424</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2014-06-24T09:06:13Z</dc:date>
    </item>
    <item>
      <title>Also, I forgot to mention,</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522701#M237425</link>
      <description>&lt;P&gt;Also, I forgot to mention, that you need to make sure that the remote end has a crypto map that also points to your second interface.&amp;nbsp; If it doesn't then your VPN tunnel will not come up.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 09:09:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522701#M237425</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-24T09:09:14Z</dc:date>
    </item>
    <item>
      <title>Hi Karthik.You asking about</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522702#M237426</link>
      <description>&lt;P&gt;Hi Karthik.&lt;/P&gt;&lt;P&gt;You asking about the other end VPN Peer ? The other end has a crypto config for both IP's ISP1 and ISP2.&lt;/P&gt;&lt;P&gt;Best regards Patrick&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 09:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522702#M237426</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2014-06-24T09:09:58Z</dc:date>
    </item>
    <item>
      <title>if you put the cable back it</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522703#M237427</link>
      <description>&lt;P&gt;if you put the cable back it comes back thru ispl1 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can try one thing.&lt;/P&gt;&lt;P&gt;no crypto map OUT1_MAP interface OUT1&lt;BR /&gt;crypto map OUT1_MAP interface OUT2&lt;/P&gt;&lt;P&gt;crypto map OUT1_MAP interface OUT1&lt;/P&gt;&lt;P&gt;no crypto ikev1 enable OUT1&lt;BR /&gt;crypto ikev1 enable OUT2&lt;/P&gt;&lt;P&gt;crypto ikev1 enable OUT1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also on the other end ask them to point out2 interface IP as priority one and out1 as the backup one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this solves the issue then&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 09:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522703#M237427</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-24T09:26:20Z</dc:date>
    </item>
    <item>
      <title>Hi Karthik.I tried that, but</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522704#M237429</link>
      <description>&lt;P&gt;Hi Karthik.&lt;/P&gt;&lt;P&gt;I tried that, but still the same.&lt;/P&gt;&lt;P&gt;This is the config of the other end.&lt;/P&gt;&lt;P&gt;crypto map outside_map 7 match address outside_cryptomap_7&lt;BR /&gt;crypto map outside_map 7 set pfs&lt;BR /&gt;crypto map outside_map 7 set peer 211.11.11.11 212.12.12.14&lt;BR /&gt;crypto map outside_map 7 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 7 set reverse-route&lt;/P&gt;&lt;P&gt;tunnel-group 212.12.12.14 type ipsec-l2l&lt;BR /&gt;tunnel-group 212.12.12.14 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 211.11.11.11 type ipsec-l2l&lt;BR /&gt;tunnel-group 211.11.11.11 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 10:00:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522704#M237429</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2014-06-24T10:00:48Z</dc:date>
    </item>
    <item>
      <title>Hi Patrick,Can you make like</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522705#M237431</link>
      <description>&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;Can you make like this for the crypto command.&lt;/P&gt;&lt;P&gt;crypto map outside_map 7 set peer&amp;nbsp; 212.12.12.14 211.11.11.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All we need to do is on the both the sides wherever you can prioritize ISP2 we have to do it and try.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 10:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522705#M237431</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-24T10:06:35Z</dc:date>
    </item>
    <item>
      <title>Even after a reboot, the VPN</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522706#M237432</link>
      <description>&lt;P&gt;Even after a reboot, the VPN don't go out the right Interface.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 10:07:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522706#M237432</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2014-06-24T10:07:10Z</dc:date>
    </item>
    <item>
      <title>Hi Karthik.The primary should</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522707#M237435</link>
      <description>&lt;P&gt;Hi Karthik.&lt;/P&gt;&lt;P&gt;The primary should be a the first postion, i did that too.&lt;/P&gt;&lt;P&gt;But still the same.&lt;/P&gt;&lt;P&gt;Strange.&lt;/P&gt;&lt;P&gt;Regards patrick&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 10:30:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522707#M237435</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2014-06-24T10:30:08Z</dc:date>
    </item>
    <item>
      <title>Double check your static</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522708#M237438</link>
      <description>&lt;P&gt;Double check your static route for the remote peer.&amp;nbsp; Make sure there isn't a typo.&amp;nbsp; if it is correct issue the command show route and make sure that the peer route entry has the correct next hop.&amp;nbsp; If you remove the route pointing out OUT1 does the issue still persist?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 10:45:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522708#M237438</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-24T10:45:53Z</dc:date>
    </item>
    <item>
      <title>Hi Patrick, One last thing.</title>
      <link>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522709#M237441</link>
      <description>&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One last thing. Can you remove the VPN configurations/Static Routes/IP SLA which ever applicable on both the ends and put the ISP B related configuration 1st and then the ISP2.... then initiate the tunnel..... and try it out.... it should work as expected... Something like the below.... on bot the ends...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 211.11.11.9 interface OUT2&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;frequency 10&lt;BR /&gt;sla monitor schedule 2 life forever start-time now&lt;BR /&gt;!&lt;BR /&gt;sla monitor 2&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 212.12.12.12 interface OUT1&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;frequency 15&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;BR /&gt;!&lt;BR /&gt;access-list ALC_VPN extended permit ip object OBJ_INS1_NET_192_168_1 object 10.41.16.0_22&lt;BR /&gt;!&lt;BR /&gt;nat (INS1,OUT2) source static OBJ_INS1_NET_192_168_1 OBJ_INS1_NET_192_168_1 destination static 10.41.16.0_22 10.41.16.0_22 no-proxy-arp route-lookup&lt;BR /&gt;nat (INS1,OUT1) source static OBJ_INS1_NET_192_168_1 OBJ_INS1_NET_192_168_1 destination static 10.41.16.0_22 10.41.16.0_22 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;crypto map OUT1_MAP 100 match address ALC_VPN&lt;BR /&gt;crypto map OUT1_MAP 100 set pfs&lt;BR /&gt;crypto map OUT1_MAP 100 set peer 33.33.33.33&lt;BR /&gt;crypto map OUT1_MAP 100 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map OUT1_MAP interface OUT2&lt;BR /&gt;crypto map OUT1_MAP interface OUT1&lt;BR /&gt;!&lt;BR /&gt;crypto ikev1 enable OUT2&lt;BR /&gt;crypto ikev1 enable OUT1&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;!&lt;BR /&gt;tunnel-group 33.33.33.33 type ipsec-l2l&lt;BR /&gt;tunnel-group 33.33.33.33 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;===========================================================================================&lt;/P&gt;&lt;P&gt;Same way on the other end&lt;BR /&gt;=========================&lt;BR /&gt;access-list outside_cryptomap_7 extended permit ip object 10.41.16.0_22 object OBJ_INS1_NET_192_168_1 (similar like this)&lt;BR /&gt;crypto map outside_map 7 match address outside_cryptomap_7&lt;BR /&gt;crypto map outside_map 7 set pfs&lt;BR /&gt;crypto map outside_map 7 set peer 211.11.11.11 212.12.12.14&lt;BR /&gt;crypto map outside_map 7 set connection-type bi-directional&lt;BR /&gt;crypto map outside_map 7 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 7 set reverse-route&lt;BR /&gt;!&lt;BR /&gt;crypto ikev1 policy 7&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;!&lt;BR /&gt;tunnel-group 211.11.11.11 type ipsec-l2l&lt;BR /&gt;tunnel-group 211.11.11.11 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;tunnel-group 212.12.12.14 type ipsec-l2l&lt;BR /&gt;tunnel-group 212.12.12.14 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 11:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isp-failover-internet-access-to-isp1-and-vpn-traffic-to-isp2/m-p/2522709#M237441</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-24T11:16:19Z</dc:date>
    </item>
  </channel>
</rss>

