11-26-2018 07:18 AM - edited 02-21-2020 08:30 AM
Hi all,
I need to configure redundant paths with static routing. I have two ASA Firewalls 5505 with ASA version 8.2(5). I want to know if these Firewalls ASA versions support IP Sla monitor configuration to have redundant routes, in my case the primary route will be in outside interface and the backup in the inside interface.
Is this configuration guide applicable for my Firewalls?
Regards,
Reynaldo Lopez
Solved! Go to Solution.
11-26-2018 08:04 AM
i've not worked with asa versions older than 8.3
i think the config should be the same though - easiest way to check is type in the first line & see if it works
regards, mk
please rate if helpful or accept solution :)
11-26-2018 11:31 AM
Can you use below guide to configure :
11-26-2018 07:29 AM
5505 does support ip sla - just type cmd sla monitor 1 to verify.
yes, you can track inside & outside routes too
regards, mk
please rate if helpful or solved :)
11-26-2018 07:32 AM
example config:
sla monitor 1
type echo protocol ipIcmpEcho 8.8.8.8 interface outside
num-packets 10
timeout 1000
frequency 5
sla monitor schedule 1 life forever start-time now
route outside 0.0.0.0 0.0.0.0 190.xxx.xxx.10 1 track 10
route inside 0.0.0.0 0.0.0.0 192.168.10.2 254
track 10 rtr 1 reachability
regards, mk
11-26-2018 07:35 AM
however, that document refers to version 9.x or later
regards, mk
11-26-2018 07:40 AM
Hi mk,
Thanks for the reply.
Would the commands you shared in the last reply apply to my ASAs version? Or there is another way to configure IP sla monitoring in earlier versions like mine?
Regards,
Reynaldo Lopez
11-26-2018 08:04 AM
i've not worked with asa versions older than 8.3
i think the config should be the same though - easiest way to check is type in the first line & see if it works
regards, mk
please rate if helpful or accept solution :)
11-26-2018 11:31 AM
Can you use below guide to configure :
12-20-2019 06:27 AM
Guys - In those configuration examples, we are basically monitoring a destination in the Public Internet and using the outside interface to source it.
What if we want to monitor a destination which is reachable through a Site to Site VPN? I have configured it by using the inside interface to source it, but unfortunately this is not working. Below my config:
sla monitor 20
type echo protocol ipIcmpEcho 192.168.72.254 interface inside
frequency 5
sla monitor schedule 20 life forever start-time now
Unfortuntately, I'm getting timeouts as if traffic is not making it:
Entry number: 20
Modification time: 11:07:03.109 EST Thu Dec 19 2019
Number of Octets Used by this Entry: 2056
Number of operations attempted: 8031
Number of operations skipped: 8029
Current seconds left in Life: Forever
Operational state of entry: Active
Last time this entry was reset: Never
Connection loss occurred: FALSE
Timeout occurred: TRUE
Over thresholds occurred: FALSE
Latest RTT (milliseconds): NoConnection/Busy/Timeout
Latest operation start time: 09:25:08.110 EST Fri Dec 20 2019
Latest operation return code: Timeout
RTT Values:
RTTAvg: 0 RTTMin: 0 RTTMax: 0
NumOfRTT: 0 RTTSum: 0 RTTSum2: 0
However, if I manually source the ping it works fine:
ASA# ping inside 192.168.72.254
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.72.254, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/8/10 ms
Kind Regards,
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide