<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RIP neighbor on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705983#M534641</link>
    <description>&lt;P&gt;It doesn't look like setting a RIP neighbor is possible on the ASA 5505.&amp;nbsp; Is there a preferred method for configuring RIP between an ASA and a 2800 router?&amp;nbsp; The intention is to have a site to site VPN on the ASA to the same network that the 2800 routes to.&amp;nbsp; Two sites each with a 2800 and an ASA with the ASA acting as a backup to the dedicated circuit.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:05:39 GMT</pubDate>
    <dc:creator>MikeM-2468</dc:creator>
    <dc:date>2019-03-11T21:05:39Z</dc:date>
    <item>
      <title>RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705983#M534641</link>
      <description>&lt;P&gt;It doesn't look like setting a RIP neighbor is possible on the ASA 5505.&amp;nbsp; Is there a preferred method for configuring RIP between an ASA and a 2800 router?&amp;nbsp; The intention is to have a site to site VPN on the ASA to the same network that the 2800 routes to.&amp;nbsp; Two sites each with a 2800 and an ASA with the ASA acting as a backup to the dedicated circuit.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:05:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705983#M534641</guid>
      <dc:creator>MikeM-2468</dc:creator>
      <dc:date>2019-03-11T21:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705984#M534643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why do you need a dynamic routing protocol, static routes will serve just as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 18:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705984#M534643</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-07-29T18:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705985#M534646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the primary link goes down, I need the traffic to go over the backup link automatically.&amp;nbsp; That's what dynaimc routing is for.&amp;nbsp; It's cumbersome to have to maintain static routes on all of the devices.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 18:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705985#M534646</guid>
      <dc:creator>MikeM-2468</dc:creator>
      <dc:date>2011-07-29T18:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705986#M534651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to understand the topology&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Primary&lt;/P&gt;&lt;P&gt;2800router&lt;DIRECT connect=""&gt;2800Router&lt;/DIRECT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Backup&lt;/P&gt;&lt;P&gt;2800Router&amp;lt;&amp;gt;ASA&amp;gt;VPN&lt;ASA&gt;&amp;lt;&amp;gt;2800Router&lt;/ASA&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 18:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705986#M534651</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-07-29T18:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705987#M534653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is more accurate:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Primary&lt;/P&gt;&lt;P&gt;2800router A&lt;DIRECT connect=""&gt;2800Router B&lt;/DIRECT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Backup&lt;/P&gt;&lt;P&gt;ASA A&amp;gt;VPN&lt;ASA b=""&gt;&lt;/ASA&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2800 routers are the default gateways for all of the clients.&amp;nbsp; If the link between the two goes down, all traffic needs to go over the ASA VPN.&amp;nbsp; But no traffic should go over the VPN if the 2800 link is up.&amp;nbsp; I understand there's a single point of failure if the 2800 dies completely but that's an acceptable risk.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 18:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705987#M534653</guid>
      <dc:creator>MikeM-2468</dc:creator>
      <dc:date>2011-07-29T18:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705988#M534655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So you just run rip over the direct link only .  You have a default gateway in the routers pointing to the asa (you need this anyway for Internet access) if the rip route over the direct link goes away the default route pick up for the asa VPN tunnel.  If you run rip between the asa and routers, you will need to redistribute a static route, and amend the metrics.......simple is best.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 18:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705988#M534655</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-07-29T18:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705989#M534657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I must correct one assumption.&amp;nbsp; All traffic, including internet goes over the direct link for compliance reasons.&amp;nbsp; When the link goes down, everything then goes over the VPN.&amp;nbsp; In this scenario the internet traffic can go directly out the ASA without being routed through the VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 19:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705989#M534657</guid>
      <dc:creator>MikeM-2468</dc:creator>
      <dc:date>2011-07-29T19:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705990#M534661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nothing changes, for that to work, you just distribute a default route into rip from the head office.  The default static route in the router just need to have a higher admin distance than the rip route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The asa does not need to run rip.  I have 4 data centres, each with dynamic vpn tunnels to over 200 hundred sites each, My asa's do not run any dynamic routing protocol, and I have bullet proof failover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But do it how you want to, just pointing out there is more than one way to do anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 19:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705990#M534661</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-07-29T19:09:15Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705991#M534663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the end, do I really need RIP?&amp;nbsp; Can't I just put two default gateways in the 2800 routers.&amp;nbsp; One pointing over the link and the other with a higher metric pointing to the ASA?&amp;nbsp; Or is that what you originally suggested?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 17:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705991#M534663</guid>
      <dc:creator>MikeM-2468</dc:creator>
      <dc:date>2011-08-01T17:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: RIP neighbor on ASA</title>
      <link>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705992#M534666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would say - yes it would be the best option to have a dynamic routing protocol over the link between the 2800 routers. Once those dynamic routes are no longer avialable the already existing default route takes over.&amp;nbsp; However&amp;nbsp; you could have GRE tunnels traversing the ASA VPN and run a dynamic routing protocol over the GRE tunnel inside the VPN. &lt;/P&gt;&lt;P&gt;That way you could tweak your failover response time down to miliseconds if you so desired.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My point is - just you can make it complicated, that does not mean it's the best way or even will give you the best results.&amp;nbsp; The ASA is a firewall, not a router; just because it supports routing protocols - does not make it a router. Let a firewall be a firewall, and a router be a router JMTPW.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 17:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rip-neighbor-on-asa/m-p/1705992#M534666</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-08-01T17:49:43Z</dc:date>
    </item>
  </channel>
</rss>

