10-14-2018 08:30 PM - edited 02-21-2020 08:21 AM
Good day everyone,
I would like to ask if it is possible to configure site to site vpn on an active-standby firewall reaching 1 peer but using two different interfaces outside1(isp1) and outside2(isp2). Our goal is to have site to site vpn on both interfaces or a failover vpn wherein when isp1 goes down still we have isp2 for site to site vpn.
Our setup before was we have two standalone firewall that caters vpn to 1 peer via fw1(isp1) and the other firewall that cater vpn to same peer but via firewall2 (isp2). Of course, it won't have any problem since the 2 firewalls are standalone. And decided to buy 2 new firewall replaced the existing and change the setup that two firewalls will be active-standby which acts as a 1 firewall logically that has failover.
Is it possible to have site to site vpn same way from the previous setup that both outside1 and outside2 interface have 2 simultaneous vpn? Our setup have different interesting traffic for outside1 and for outside2 but will have one single peer.
I don't know if this makes sense to you guys but I hope it would.
Thank you.
10-14-2018 10:39 PM
10-14-2018 11:02 PM
10-14-2018 11:09 PM
Just add the same crypto map to the same interface. Not much config
10-15-2018 10:38 AM
You have to configure the tunnels and nats/exemptions, crypto sets, match lists, etc on both interfaces of the head end. your remote side peers will need to specify the peer IPs of each outside interface of your headend asa in order of preference.
11-03-2018 04:30 PM
really good explanation here:
https://community.cisco.com/t5/security-documents/dual-isp-implementation-on-asa/ta-p/3144475
hope that helps.
azam
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide