The examples you were given will work but I would say not very reliable. If you have ANY blips in the object you are monitoring, it will flop over. It would have been better if they allowed it to track more than one object like the ASR IOS code does.
sla monitor 1 type echo protocol ipIcmpEcho 188.8.131.52 interface outside-SpectraNet frequency 30 sla monitor schedule 1 life forever start-time now
sla monitor 2 type echo protocol ipIcmpEcho 184.108.40.206 interface outside-SpectraNet frequency 30 sla monitor schedule 2 life forever start-time now
track 123 rtr 1 reachability delay down 30
track 234 rtr 2 reachability delay down 30
track 456 list threshold weight object 123 weight 5 object 234 weight 5 threshold weight up 5
Site to Site IPSec VPN with Dynamic IP Endpoint is typically used when we have a branch sites which obtains a dynamic public IP from the Internet ISP. For example an ADSL connection.One important note is that Site-to-Site VPN with Dynamic remote routers P...
On R1, configure a key ring that defines the peer R3:Address: 220.127.116.11Local and remote pre-shared key: cisco R1(config)#crypto ikev2 keyring KRR1(config-ikev2-keyring)# peer R3R1(config-ikev2-keyring-peer)# address 18.104.22.168R1(config-ikev2-keyring-pee...
This document shows how to use the Port Radius NAS PORT Id Attribute in a compound condition to control access with 802.1X.A user jdoe is allowed to access the network only through the physical port FastEthernet 0/1 of the switch and the user jwhite is al...
This document provides a configuration example of Security Assertion Markup Language (SAML) Authentication on FTD managed over FDM. The configuration allows Anyconnect users to establish a VPN session authenticating with a SAML Identity Serv...
DMVPN Dual Hub Dual Cloud Pros and ConsProsNo single point of failureQuick failover if routing protocols are tunedLoad balancing is easyTraffic engineering is easyEasy to work with multiple ISPsConsNeed 2 tunnels per spokeConfiguration is more complicated...