<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Split traffic between VPN and Internet using different ISP's in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/split-traffic-between-vpn-and-internet-using-different-isp-s/m-p/1757895#M532396</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi There, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do this, you just need to make a few adjustments:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Apply the crypto map to the cable interface and enable isakmp on that interface. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Add routes to the remote site's private subnets via the cable's interface next hop e.g&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 10.0.1.0 255.255.255.0 a.b.c.d &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Add routes the remote site's public IP addresses via the cable's interface next hop&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside w.x.y.z 255.255.255.255 a.b.c.d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If&amp;nbsp; you are running 8.3 or 8.4 modify the NAT exemption rules for the VPN Tunnels from static (inside,outside) xxxx to something like static (inside,cable) xxxx &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Point your remote site's peer address to the new IP Address &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps. Let us know if you have any other questions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raga &lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Aug 2011 19:36:39 GMT</pubDate>
    <dc:creator>raga.fusionet</dc:creator>
    <dc:date>2011-08-26T19:36:39Z</dc:date>
    <item>
      <title>Split traffic between VPN and Internet using different ISP's</title>
      <link>https://community.cisco.com/t5/network-security/split-traffic-between-vpn-and-internet-using-different-isp-s/m-p/1757894#M532395</link>
      <description>&lt;P&gt;What we are trying to accomplish here use two ISP's (one cable and one T1), use the Cable line for site-to-site VPN and use T1 line for all internet traffic. We currently use the following configuration: Cisco 2820 routers terminating the T1 -&amp;gt; HP switch -&amp;gt; Cisco AS 5510 port 0 -&amp;gt; port 1 to LAN switch (Nortel 5510)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We want to force all VPN traffic (using 10.0.0.0/24 subnets - 10.0.1.0, 10.0.2.0, etc) through a cable connection, perhaps on port 2 of the ASA, then all non VPN traffic goes to the T1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to do this without too much difficulty?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-traffic-between-vpn-and-internet-using-different-isp-s/m-p/1757894#M532395</guid>
      <dc:creator>kvmann2</dc:creator>
      <dc:date>2019-03-11T21:17:38Z</dc:date>
    </item>
    <item>
      <title>Split traffic between VPN and Internet using different ISP's</title>
      <link>https://community.cisco.com/t5/network-security/split-traffic-between-vpn-and-internet-using-different-isp-s/m-p/1757895#M532396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi There, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do this, you just need to make a few adjustments:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Apply the crypto map to the cable interface and enable isakmp on that interface. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Add routes to the remote site's private subnets via the cable's interface next hop e.g&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 10.0.1.0 255.255.255.0 a.b.c.d &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Add routes the remote site's public IP addresses via the cable's interface next hop&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside w.x.y.z 255.255.255.255 a.b.c.d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If&amp;nbsp; you are running 8.3 or 8.4 modify the NAT exemption rules for the VPN Tunnels from static (inside,outside) xxxx to something like static (inside,cable) xxxx &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Point your remote site's peer address to the new IP Address &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps. Let us know if you have any other questions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raga &lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Aug 2011 19:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-traffic-between-vpn-and-internet-using-different-isp-s/m-p/1757895#M532396</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-26T19:36:39Z</dc:date>
    </item>
  </channel>
</rss>

