08-28-2018 11:32 AM - edited 02-21-2020 08:09 AM
Hello,
We currently have a pair of ASA 5510 configured in a failver. We have a Site-To-Site IPSec VPN configured to a remote site. So, hardware-wise, we have a fail-over solution but not a logical one where if the IPSec tunnel were to fail then it would failover to another tunnel. Is there such solution? Are are any recommendations to mitigate IPSec Tunnel failures provided that the primary ASA and the link to the ISP are operational?
Thanks in advance.
~zK
08-28-2018 01:54 PM
08-28-2018 01:56 PM
Hello,
Are you considering a scenario wherein you have dual ISP and you wish to fall back to second ISP for vpn tunnel if the primary ISP fails, then yes it is possible:
It will be similar to :
https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979
If you have any other specific failure scenario in mind, please let us know.
Regards,
AJ
08-28-2018 02:01 PM
You may also be able to setup the firewalls in multiple context mode in an active/active state. You could then build an IPSec tunnel from each ASA through the two ISPs and have both tunnels up at the same time. Depending on your routing, you could send some traffic one way, and some traffic the other way. There are some caveats with multiple-contexts, such as you cannot have the same vlan between contexts.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide