<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA with a secondary route via IPSec (ospf?) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243396#M357495</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also don't really understand the scenario ... but the ASA can run routing through a VPN. It's described in the following document:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00804acfea.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00804acfea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still, a router would probably be the better device to achive the desired result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;/P&gt;&lt;P&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 May 2013 17:33:09 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2013-05-24T17:33:09Z</dc:date>
    <item>
      <title>ASA with a secondary route via IPSec (ospf?)</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243392#M357491</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a simple requirment that I am hoping somone can kindly validate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Running an ASA firewall, I would like to achieve the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to setup two external routes for my firewall. The primary/default would use the outside interface. Should this route become unavailable, I would like to route via an IPSec LAN2LAN tunnel, using the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Question, can I run ospf over both the outside and VPN tunnel tunnel to achive this routing scenario (seeing as they reside on the same interface, I am a little conceraned) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice apprecaited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Matt &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243392#M357491</guid>
      <dc:creator>mcroft</dc:creator>
      <dc:date>2019-03-12T01:48:47Z</dc:date>
    </item>
    <item>
      <title>ASA with a secondary route via IPSec (ospf?)</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243393#M357492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you would need GRE to be able to run routing protocol through a L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And ASA cant do IPsec + GRE tunnels like Cisco Routers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it doesnt really seem possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I am a bit confused about this purpose. You say you would be using a single interface for both the normal default route and the L2L VPN connection. Wouldnt a failure fail both routes if we presumed this could be done on the ASA alone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 16:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243393#M357492</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-24T16:45:33Z</dc:date>
    </item>
    <item>
      <title>ASA with a secondary route via IPSec (ospf?)</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243394#M357493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the reponse.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have just been looking at the ASDM.&lt;/P&gt;&lt;P&gt;It looks like there is a 'Tracking Option' under the routing section. So, you can add a couple static routes one with a higher SLA ID and then track accriding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure how this will work with a crypto map though, may screw it all up. But worth a test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the purpose, they would share the same outside interface but have two different gatways (LAN Router &amp;amp; ISP Router), however, they are in a failover pair. So if the physical ethernet port / connection fails, the ASA would fail to the secondary unit. The failover unit would then pick up the IPSEC VPN route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thats my thinking anyways &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Viable ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 17:12:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243394#M357493</guid>
      <dc:creator>mcroft</dc:creator>
      <dc:date>2013-05-24T17:12:21Z</dc:date>
    </item>
    <item>
      <title>ASA with a secondary route via IPSec (ospf?)</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243395#M357494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly I cant really provide much insight to this setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But to my understanding you need GRE to be able to run routing through a L2L VPN connection. And as ASA cant do that it is not possible to my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still dont understand the setup completely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally your default route would be the ISP Router and if it failed you would start routing towards some LAN Router/L2L VPN. Where would that L2L VPN be connected to?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 17:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243395#M357494</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-24T17:24:40Z</dc:date>
    </item>
    <item>
      <title>ASA with a secondary route via IPSec (ospf?)</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243396#M357495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also don't really understand the scenario ... but the ASA can run routing through a VPN. It's described in the following document:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00804acfea.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00804acfea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still, a router would probably be the better device to achive the desired result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;/P&gt;&lt;P&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 17:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-a-secondary-route-via-ipsec-ospf/m-p/2243396#M357495</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-05-24T17:33:09Z</dc:date>
    </item>
  </channel>
</rss>

