<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dual ISP with IPSecVPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037385#M439079</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jemel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to configure to crypto maps on the other site as you cannot use the same Ip address because each interface as you know its on it's own broadcast domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So&lt;/P&gt;&lt;P&gt;On site A configure SLA, and 2 crypto maps one on each interface&lt;/P&gt;&lt;P&gt;On site B configure 2 crypto map one for interface A ( the active ) and one for interface B ( The secondary )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 Aug 2012 23:19:33 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-08-21T23:19:33Z</dc:date>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037384#M439078</link>
      <description>&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;I've been doing some research on how to configure an ASA with Dual ISP with IPSec Tunnel going to HQ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/7/2/0/99027-Scenario_ASA.JPG" alt="Scenario_ASA.JPG" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;Here is the outline that I think I need I may need to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;1.&amp;nbsp; Configure the Redundant Link, which led me to this: &lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml" style="border-collapse: collapse; list-style: none; color: #2e6583;" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;Fair enough, I was able to grasps the concept on the above link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial; min-height: 8pt; height: 8pt;"&gt;2. Configure VPN with HQ_ASA. This seems to be the tough part.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;What I would like to do is that Primary Link (15 Mbps DSL) will form VPN Peer with HQ when it is UP (used tracking as stated above).&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;When the Primary Link fails Secondary Link (5 Mbps DSL) will form a New VPN Peer with HQ &lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;On both instances, the HQ_VPN Peer will have the same IP Address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;Looking forward for your response guys.&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037384#M439078</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2019-03-11T23:44:57Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037385#M439079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jemel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to configure to crypto maps on the other site as you cannot use the same Ip address because each interface as you know its on it's own broadcast domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So&lt;/P&gt;&lt;P&gt;On site A configure SLA, and 2 crypto maps one on each interface&lt;/P&gt;&lt;P&gt;On site B configure 2 crypto map one for interface A ( the active ) and one for interface B ( The secondary )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 23:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037385#M439079</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-21T23:19:33Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037386#M439080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Julio.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seems to be feasible. Do you happen to know other documentation for implementing such? &lt;/P&gt;&lt;P&gt;I've been actually working on 5510s just a little over 4 months and man, this is intense! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jemel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 23:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037386#M439080</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2012-08-21T23:46:47Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037387#M439081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jemel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I understand what you mean but no I have not seen any documents related to this but I could help if required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again on site A just configure the normal stuff ( 2 interfaces, the SLA stuff, create 2 crypto maps and apply one in the primary interface and the other one on the secondary)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On site B just create 2 crypto maps ( One will set the peer to be the ASA1 Primary link, The second one will be the ASA1 Secondary link) Isakmp will try to communicate to both interfaces but as only one is active only one tunnel will be generated &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if I was clear enough, if not do not worry just let me know and I will be more than glad to help you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037387#M439081</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-22T00:50:06Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037388#M439082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Julio. &lt;/P&gt;&lt;P&gt;This has been very helpful. I am on the right track with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jemel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037388#M439082</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2012-08-22T00:58:18Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037389#M439083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't implemented this yet, doing a little testing using gns3.&lt;/P&gt;&lt;P&gt;It came to me, what will happen the NAT configurations I have?&lt;/P&gt;&lt;P&gt;It seems that the protected networks, (siteA inside network and siteB inside network) will likely be OK.&lt;/P&gt;&lt;P&gt;What about the other traffic like internet traffic? How will it be NATed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jemel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 09:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037389#M439083</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2012-08-23T09:48:30Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037390#M439084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On site A you will need to create nat for the primary and the secondary link, just in case the primary goes down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you will be natted to the primary as soon as it's up &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 16:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037390#M439084</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-23T16:31:14Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037391#M439085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Santiago,&lt;/P&gt;&lt;P&gt;According to your diagram HQ only has one link to the internet is this correct? &lt;/P&gt;&lt;P&gt;If so then you should only need one crypto map applied to the outside interface and specify two peers on the crypto map statement, peer 1 15 mbps ISP, peer 2 5 mbps ISP. &lt;/P&gt;&lt;P&gt;Julio, please correct me if I’m wrong or if we can configure two crypto maps to the same interface. &lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Juan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 16:43:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037391#M439085</guid>
      <dc:creator>juan-ruiz</dc:creator>
      <dc:date>2012-08-23T16:43:16Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037392#M439086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Juan Ruiz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only have one crypto map on each interface but each of the crypto map can have more than one entry ( so you will set 2 peers,etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037392#M439086</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-23T17:00:34Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037393#M439087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's understood, so there will be 2 NAT entries, one for each interface whichever is active.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Juan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I came across the same scenario. It also mentioned just having to create 1 crypto map with 2 peers in it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2060152"&gt;https://supportforums.cisco.com/thread/2060152&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm planning to implement this though and the other as suggested by Julio.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 22:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037393#M439087</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2012-08-23T22:17:28Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037394#M439088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct Santiago &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all the helpful posts &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 03:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037394#M439088</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-24T03:25:57Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037395#M439090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've actually tried and implemented the project but there seem to be an issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There was nothing that was configured on the:&lt;/P&gt;&lt;P&gt;Configuration &amp;gt; Device Setup &amp;gt; Routing &amp;gt; Static Routes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, when I checked on the device, and tried show route there's seem to be an entry in the routing table:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh route &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is x.x.x.x to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; a.a.a.a 255.255.255.0 is directly connected, inside&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; x.x.x.x 255.255.255.248 is directly connected, outside&lt;/P&gt;&lt;P&gt;d*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via x.x.x.x, outside&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May I know why is it that the new interface that I added which is PPPoE is not listed as CONNECTED?&lt;/P&gt;&lt;P&gt;And also, what caused the default route to be d*?&lt;/P&gt;&lt;P&gt;Hoping to here from you soon.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2012 03:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037395#M439090</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2012-08-25T03:58:46Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037396#M439092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jemel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the interface is up, you should see the network directly connected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RIght now looks like the ASA does not have the interface properly configured. if you do a sh interface ip brief what is the status of the interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2012 04:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037396#M439092</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-25T04:19:39Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037397#M439094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jemel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using the protocol IKEV2 or is that your intention?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean looks like you are using IKEv1, I think you are referring to phase 2 (Ipsec).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem you are having now it's because of the configuration between both sides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do the following&lt;/P&gt;&lt;P&gt;-Check the Diffie-Hellman group on each side&lt;/P&gt;&lt;P&gt;-Check that both sides has a pre-shared key configured ( On router B you need to have 2, one for each peer) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all the helpful posts&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2012 17:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037397#M439094</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-25T17:23:15Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037398#M439097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've checked on the DH, and both sides are on Group 2.&lt;/P&gt;&lt;P&gt;I will check on the pre-shared key if both sides are correct.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Aug 2012 22:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037398#M439097</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2012-08-26T22:19:45Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037399#M439099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jemel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have similar setup in real world. Below is the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;in HQ&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; 1) Under main crypto map , just add seconday IP of Branch WAN2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;crypto map Outside_map 1 set peer &lt;EM&gt;&lt;STRONG&gt;x.x.x.x y.y.y.y&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;x.x.x.x&lt;/STRONG&gt;&lt;/EM&gt; = Branch Primary WAN IP&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;y.y.y.y&lt;/STRONG&gt;&lt;/EM&gt; = Branch Secondary WAN IP&lt;BR /&gt;&lt;BR /&gt;2) Create a Tunnel-group for backup peer&lt;BR /&gt;&lt;BR /&gt;&lt;PRE&gt;tunnel-group &lt;STRONG&gt;&lt;EM&gt;y.y.y.y&lt;/EM&gt;&lt;/STRONG&gt; type ipsec-l2l
tunnel-group &lt;STRONG&gt;&lt;EM&gt;y.y.y.y&lt;/EM&gt;&lt;/STRONG&gt; ipsec-attributes
 pre-shared-key try123&lt;/PRE&gt;
&lt;STRONG style="text-decoration: underline; "&gt;in Branch&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;1) Just apply crypto map to backup interface.&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;crypto map Outside_map interface &lt;EM&gt;&lt;STRONG&gt;backup_wan&lt;/STRONG&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Aug 2012 04:13:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037399#M439099</guid>
      <dc:creator>NAGISWAREN2</dc:creator>
      <dc:date>2012-08-27T04:13:45Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037400#M439100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jemel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sure.. Keep me posted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do a more system:running-config | begin tunnel-group &lt;/P&gt;&lt;P&gt;in order to check them on clear text.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Aug 2012 04:37:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037400#M439100</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-27T04:37:20Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037401#M439101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV style="border-collapse: collapse; list-style: none; margin: 0px 0px 20px; padding: 2px; overflow: visible; position: relative; zoom: 1; width: 357.3833312988281px;"&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;Hello Waren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;Thanks! Will give this a try tomorrow.&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;I'm currently using 8.4 ASA so there might be a little difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;With HQ, do I need to configure the Group Policy?&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;Should it also have the same Group Policy as the primary Peer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Aug 2012 05:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037401#M439101</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2012-08-27T05:50:13Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037402#M439102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jemel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By right, there is no need to configure Group Policy, Just adding the Tunnel-group / backup peer ip will do. It will work for 8.2/8.3/8.4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Aug 2012 05:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037402#M439102</guid>
      <dc:creator>NAGISWAREN2</dc:creator>
      <dc:date>2012-08-27T05:54:38Z</dc:date>
    </item>
    <item>
      <title>Dual ISP with IPSecVPN</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037403#M439103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Waren.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope the vpn tunnel will work after this configuration changes.&lt;/P&gt;&lt;P&gt;Will update you if it does.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jemel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Aug 2012 06:03:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-with-ipsecvpn/m-p/2037403#M439103</guid>
      <dc:creator>santiago.jem</dc:creator>
      <dc:date>2012-08-27T06:03:30Z</dc:date>
    </item>
  </channel>
</rss>

