<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Best way to load balance VPNs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/best-way-to-load-balance-vpns/m-p/1165760#M953233</link>
    <description>&lt;P&gt;I have two ASA 5540s that I would like to configure for VPN load balancing.  I had been looking at the Active / Standby configurations, but am curious if doing this I can truly get VPN load balancing or if this means all VPNs on the active unit and then when a failure happens all VPNs go over to the standby unit.  This isn't what I want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have found some documents that talk about setting up a cluster.  But I think these documents are telling me not to configure the two ASAs as a active / standby failover pair.  Does that make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway - what is the best way to accomplish VPN load balancing?  In our setup these ASAs will only be handling VPNs (no firewalling will be done here).&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 11:29:05 GMT</pubDate>
    <dc:creator>jim_berlow</dc:creator>
    <dc:date>2020-02-21T11:29:05Z</dc:date>
    <item>
      <title>Best way to load balance VPNs</title>
      <link>https://community.cisco.com/t5/network-security/best-way-to-load-balance-vpns/m-p/1165760#M953233</link>
      <description>&lt;P&gt;I have two ASA 5540s that I would like to configure for VPN load balancing.  I had been looking at the Active / Standby configurations, but am curious if doing this I can truly get VPN load balancing or if this means all VPNs on the active unit and then when a failure happens all VPNs go over to the standby unit.  This isn't what I want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have found some documents that talk about setting up a cluster.  But I think these documents are telling me not to configure the two ASAs as a active / standby failover pair.  Does that make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway - what is the best way to accomplish VPN load balancing?  In our setup these ASAs will only be handling VPNs (no firewalling will be done here).&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-way-to-load-balance-vpns/m-p/1165760#M953233</guid>
      <dc:creator>jim_berlow</dc:creator>
      <dc:date>2020-02-21T11:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to load balance VPNs</title>
      <link>https://community.cisco.com/t5/network-security/best-way-to-load-balance-vpns/m-p/1165761#M953235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;An active/standby failover pair configuration will provide for resiliency in the event of a hardware or software failure.  One ASA is "Active" while the other is in a "Standby" mode.  Config and state information is synchronized between the two devices.  Only one ASA services client connections at any given time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Load balancing, on the other hand, allows you to configure a "cluster" with multiple participants.  Each participating ASA can service client connections thus sharing the load.  The following doc gives a good overview of load balancing and provides sample configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/vpnsysop.html#wp1048959" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/vpnsysop.html#wp1048959&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 May 2009 18:00:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-way-to-load-balance-vpns/m-p/1165761#M953235</guid>
      <dc:creator>Todd Pula</dc:creator>
      <dc:date>2009-05-27T18:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to load balance VPNs</title>
      <link>https://community.cisco.com/t5/network-security/best-way-to-load-balance-vpns/m-p/1165762#M953238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks - good information.  So to clarify, there is no way to load balance Site to Site VPN tunnels across 2 ASAs (either through active / standby or clustering).  It appears that clustering will only load balance remote access VPN user connections using a VPN client.  Do I have this right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 May 2009 19:03:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-way-to-load-balance-vpns/m-p/1165762#M953238</guid>
      <dc:creator>jim_berlow</dc:creator>
      <dc:date>2009-05-27T19:03:19Z</dc:date>
    </item>
  </channel>
</rss>

