<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: redundant firewall design in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/redundant-firewall-design/m-p/1699014#M563183</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SLA monitoring will help you out on this one. If the primary route fails, VPN will try to establish on the secondary Link. If it is a site to site tunnel you can add a secondary peer so it can establish the VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the configuration for SLA monitor. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 May 2011 18:43:57 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-05-05T18:43:57Z</dc:date>
    <item>
      <title>redundant firewall design</title>
      <link>https://community.cisco.com/t5/network-security/redundant-firewall-design/m-p/1699013#M563177</link>
      <description>&lt;P&gt;Hi Forumer's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just seeking idea on how to design on redundant firewall design&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. branch firewall got dual uplink, which normal time is using primary line connect to HQ. If connection to HQ fail, then will swap to secondary link for ensure connection resume.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2, failover between HQ and DRC, anything need to mention for this part?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. what's the best way to design this topology?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully with your idea can spakle me to drill deeper, thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:29:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redundant-firewall-design/m-p/1699013#M563177</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2019-03-11T20:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: redundant firewall design</title>
      <link>https://community.cisco.com/t5/network-security/redundant-firewall-design/m-p/1699014#M563183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SLA monitoring will help you out on this one. If the primary route fails, VPN will try to establish on the secondary Link. If it is a site to site tunnel you can add a secondary peer so it can establish the VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the configuration for SLA monitor. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 18:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redundant-firewall-design/m-p/1699014#M563183</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-05T18:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: redundant firewall design</title>
      <link>https://community.cisco.com/t5/network-security/redundant-firewall-design/m-p/1699015#M563188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wondering can ASA support on MPLS? because the WAN strucuture is running on MPLS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 May 2011 06:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redundant-firewall-design/m-p/1699015#M563188</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2011-05-06T06:58:05Z</dc:date>
    </item>
  </channel>
</rss>

