<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Terminate RA VPN clients on 2nd Intfc from different ISP? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453341#M652052</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please try this command on the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside2 192.168.252.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 22 Aug 2010 15:55:37 GMT</pubDate>
    <dc:creator>Nagaraja Thanthry</dc:creator>
    <dc:date>2010-08-22T15:55:37Z</dc:date>
    <item>
      <title>Terminate RA VPN clients on 2nd Intfc from different ISP?</title>
      <link>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453338#M652011</link>
      <description>&lt;P&gt;Our ASA 5520 was used to terminate VPN clients only.&amp;nbsp; Today I terminated a 2nd ISP connection on another interface and made that the default interface on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As soon as I did that, VPN connections no longer connected to the original interface, I'm assuming because the response packets are now exiting via the new default interface.&amp;nbsp;&amp;nbsp;&amp;nbsp; I had thought that the reverse-route command would take care of this issue but it doesn't apear to be doing the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this dual-ISP configuration possible?&amp;nbsp; How to get the ASA to respond to VPN connection attempts on the non-default interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any suggestions!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453338#M652011</guid>
      <dc:creator>craig</dc:creator>
      <dc:date>2019-03-11T18:29:07Z</dc:date>
    </item>
    <item>
      <title>Re: Terminate RA VPN clients on 2nd Intfc from different ISP?</title>
      <link>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453339#M652023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope&amp;nbsp; you must be doing good!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well yes scenrio is possible, could you please attach the configuration and&amp;nbsp; i will suggest you the work around accordingly..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ankur&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Aug 2010 15:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453339#M652023</guid>
      <dc:creator>athukral</dc:creator>
      <dc:date>2010-08-22T15:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Terminate RA VPN clients on 2nd Intfc from different ISP?</title>
      <link>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453340#M652040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully the attached config gives enough information.&amp;nbsp;&amp;nbsp; Interface Outside2 is the one I added and set as the default route.&amp;nbsp; It worked fine but the VPN client connections on Outside then stopped negotiating.&amp;nbsp; As you can see, I've set 'Outside' back to default for the time being and generic web traffic is using another firewall for the time being.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Aug 2010 15:46:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453340#M652040</guid>
      <dc:creator>craig</dc:creator>
      <dc:date>2010-08-22T15:46:13Z</dc:date>
    </item>
    <item>
      <title>Re: Terminate RA VPN clients on 2nd Intfc from different ISP?</title>
      <link>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453341#M652052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please try this command on the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside2 192.168.252.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Aug 2010 15:55:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453341#M652052</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-22T15:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Terminate RA VPN clients on 2nd Intfc from different ISP?</title>
      <link>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453342#M652064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you might want to remove the RRI configuration as that will install&lt;/P&gt;&lt;P&gt;host routes. And when the router looks up the host routes, the next hop will&lt;/P&gt;&lt;P&gt;be visible via the default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Aug 2010 15:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453342#M652064</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-22T15:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Terminate RA VPN clients on 2nd Intfc from different ISP?</title>
      <link>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453343#M652075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thankyou for the suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did add the route but I'm afraid we're failing during the initial ISAKMP negotiation before the 192.168.252.x address is even applied.&amp;nbsp; The firewall log simply shows 'duplicate Phase 1 packet detected' which probably means that ASA's&amp;nbsp; ISAKMP response is going out the new default interface (outside2) and the remote system is not accepting it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'Outside' is the interface the VPN traffic comes in on and 'Outside2' is the new general route to the internet.&amp;nbsp; The config I sent you reflects my change back to the original route to allow VPN users to connect.&amp;nbsp; Sorry for the confusion.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Aug 2010 16:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminate-ra-vpn-clients-on-2nd-intfc-from-different-isp/m-p/1453343#M652075</guid>
      <dc:creator>craig</dc:creator>
      <dc:date>2010-08-22T16:14:47Z</dc:date>
    </item>
  </channel>
</rss>

