<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 - Load Balancing Traffic over two ISPs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556929#M607853</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks that is what I need. Now where can I get the IOS upgrades for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Nov 2010 01:37:16 GMT</pubDate>
    <dc:creator>Jesse Shumaker</dc:creator>
    <dc:date>2010-11-01T01:37:16Z</dc:date>
    <item>
      <title>ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556923#M607847</link>
      <description>&lt;P&gt;I have two isp's going out from my office and was wondering if there is a way to load balance all the traffic. meaning I have an interface dedicated to each line and I would like to make it so that the asa will send any traffic over isp1 then with the next session send the traffic over isp2 so they are balancing the load and if one conncetion drops send all traffic to the other isp's connection. I've seen articles about load balancing but they have been with vpn's or another router in front. I've seen articles doing this using sla tracking but on my 5510 using either the cli or the asdm I could not find howto configure this. Perhaps it's not included in the particlar ios i'm running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if there is a way to do this solution on my 5510. here are the exact specs of the firewall using sh ver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 7.0(8)&lt;BR /&gt;Device Manager Version 5.0(8)&lt;/P&gt;&lt;P&gt;Compiled on Sat 31-May-08 23:48 by builders&lt;BR /&gt;System image file is "disk0:/asa708-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;CiscoASA5510 up 4 days 20 hours&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5510, 256 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;BR /&gt;Internal ATA Compact Flash, 256MB&lt;BR /&gt;BIOS Flash M50FW080 @ 0xffe00000, 1024KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Boot microcode&amp;nbsp;&amp;nbsp; : CNlite-MC-Boot-Cisco-1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL/IKE microcode: CNlite-MC-IPSEC-Admin-3.03&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec microcode&amp;nbsp; : CNlite-MC-IPSECm-MAIN-2.05&lt;BR /&gt; 0: Ext: Ethernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0021.5537.a424, irq 9&lt;BR /&gt; 1: Ext: Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0021.5537.a425, irq 9&lt;BR /&gt; 2: Ext: Ethernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0021.5537.a426, irq 9&lt;BR /&gt; 3: Ext: Not licensed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 9&lt;BR /&gt; 4: Ext: Management0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0021.5537.a428, irq 11&lt;BR /&gt; 5: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 11&lt;BR /&gt; 6: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 5&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : 4&lt;BR /&gt;Maximum VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10&lt;BR /&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&lt;BR /&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;BR /&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;BR /&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;BR /&gt;Security Contexts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;BR /&gt;GTP/GPRS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;BR /&gt;VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 50&lt;/P&gt;&lt;P&gt;This platform has a Base license.&lt;/P&gt;&lt;P&gt;Serial Number: xxxxxxxx&lt;BR /&gt;Running Activation Key: xxxxxxx xxxxxx xxxxxxx xxxxxxx xxxxxxxxx&lt;/P&gt;&lt;P&gt;Configuration register is 0x1&lt;BR /&gt;Configuration last modified by enable_15 at 17:04:50.032 MST Fri Jan 3 2003&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556923#M607847</guid>
      <dc:creator>Jesse Shumaker</dc:creator>
      <dc:date>2019-03-11T19:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556924#M607848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jesse, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, the ASA firewall does not support load balancing, here is a document that can give you more information about it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#q6i"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#q6i&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you can do is to use the second ISP as a backup only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 20:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556924#M607848</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-31T20:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556925#M607849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the failover is done with sla monitor/tracking correct? How is this setup and how can I know if my 5510 supports this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 20:42:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556925#M607849</guid>
      <dc:creator>Jesse Shumaker</dc:creator>
      <dc:date>2010-10-31T20:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556926#M607850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yup, here is a document that explains how to do it step by step&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2 class="title-page"&gt;&lt;SPAN style="font-size: 10pt;"&gt;ASA/PIX 7.x: Redundant or Backup ISP Links Configuration Example&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 20:46:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556926#M607850</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-31T20:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556927#M607851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Where would I goto within the cli to input the sla commands? It doesn't seem like this asa has that ability. I've gone into the cli within global config and have not seen the commands anywhere. The asdm also doesn't not have them visible. Where can I check to see if this asa 5510 can use sla monitoring? I'm wondering if it's the IOS i'm running. here is my sh ver. thanks for all your help&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 7.0(8)&lt;BR /&gt;Device Manager Version 5.0(8)&lt;/P&gt;&lt;P&gt;Compiled on Sat 31-May-08 23:48 by builders&lt;BR /&gt;System image file is "disk0:/asa708-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;CiscoASA5510 up 4 days 22 hours&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5510, 256 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;BR /&gt;Internal ATA Compact Flash, 256MB&lt;BR /&gt;BIOS Flash M50FW080 @ 0xffe00000, 1024KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Boot microcode&amp;nbsp;&amp;nbsp; : CNlite-MC-Boot-Cisco-1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL/IKE microcode: CNlite-MC-IPSEC-Admin-3.03&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec microcode&amp;nbsp; : CNlite-MC-IPSECm-MAIN-2.05&lt;BR /&gt; 0: Ext: Ethernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0021.5537.a424, irq 9&lt;BR /&gt; 1: Ext: Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0021.5537.a425, irq 9&lt;BR /&gt; 2: Ext: Ethernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0021.5537.a426, irq 9&lt;BR /&gt; 3: Ext: Not licensed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 9&lt;BR /&gt; 4: Ext: Management0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0021.5537.a428, irq 11&lt;BR /&gt; 5: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 11&lt;BR /&gt; 6: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 5&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : 4&lt;BR /&gt;Maximum VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10&lt;BR /&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&lt;BR /&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;BR /&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;BR /&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;BR /&gt;Security Contexts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;BR /&gt;GTP/GPRS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;BR /&gt;VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 50&lt;/P&gt;&lt;P&gt;This platform has a Base license.&lt;/P&gt;&lt;P&gt;Serial Number: JMX1231L10H&lt;BR /&gt;Running Activation Key: xxxx xxxxx xxxxx&lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;Configuration last modified by enable_15 at 17:04:50.222 MST Fri Jan 3 2003&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 22:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556927#M607851</guid>
      <dc:creator>Jesse Shumaker</dc:creator>
      <dc:date>2010-10-31T22:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556928#M607852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for posting, on the document states that you will need to use version 7.2.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;"You can also use this configuration with the Cisco ASA 5500 Series &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Appliance version 7.2(1)"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how you can upgrade the code&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008067e9f9.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008067e9f9.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml"&gt;&lt;SPAN class="content"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 23:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556928#M607852</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-31T23:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556929#M607853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks that is what I need. Now where can I get the IOS upgrades for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 01:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556929#M607853</guid>
      <dc:creator>Jesse Shumaker</dc:creator>
      <dc:date>2010-11-01T01:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556930#M607854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Follow this path&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go to Cisco.com&lt;/P&gt;&lt;P&gt;Select Support&lt;/P&gt;&lt;P&gt;Download software&lt;/P&gt;&lt;P&gt;In the box type ASA &lt;/P&gt;&lt;P&gt;Select ASA 5510&lt;/P&gt;&lt;P&gt;Then select ASA security appliance Software&lt;/P&gt;&lt;P&gt;Select the image you want (Higher than 7.2 so you can use SLA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 01:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556930#M607854</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-01T01:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556931#M607855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just curious, why could I not make two default routes to each isp like the following? would the router only take the first entry and move all traffic over this default route or would it see to two equal cost routes and distribute the traffic over the two.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route Cox_Primary 0.0.0.0 0.0.0.0 10.0.0.1 1&lt;/P&gt;&lt;P&gt;route Qwest_Backup 0.0.0.0 0.0.0.0 10.254.254.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 05:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556931#M607855</guid>
      <dc:creator>Jesse Shumaker</dc:creator>
      <dc:date>2010-11-01T05:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Load Balancing Traffic over two ISPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556932#M607856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the 2 links were on the same network over the same interface, it will distribute or "load balance" (not really load balancing) the traffic between the 2 equal cost routes. If they are on different interfaces (ISP's) only the first one that you configure is going to take precedence. If the primary ISP goes down it will not take the second one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 12:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-load-balancing-traffic-over-two-isps/m-p/1556932#M607856</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-01T12:42:45Z</dc:date>
    </item>
  </channel>
</rss>

