01-12-2025 03:39 AM
Like the title says, I am looking to setup a connection to an endpoint, but, with connectivity via 2 x IKEv2 tunnels (I've only even done single tunnels).
It appears to me that if we set them up in paralell, we would run into all sorts of NAT issues etc... (all same networks and setting, just 2 independent tunnels).
Tunnels will be in primary and secondary setup (i.e. only one used at a time).
When searching documents on it, I keep getting dragged into VPN client setups, I want site to site VPN tunnels.
Also, I have been advised this can be done in tunnels groups and crypto maps, but not sure how.
Any advice or links greatly appreciated.
01-12-2025 03:43 AM
You use VTI or policy based VPN?
MHM
01-12-2025 03:49 AM
I haven't tried anything, as I don't even know where to start.... like I mentioned, single tunnels, fine with.... two parallell, no idea?
Working in ASDM too, so not a CLI specialist on the ASA's.
Do I just setup 2x tunnels as normal and link them together with VTI or policy based VPN ?
Will have a look into those two points (never used them, again, new to ASA's, first time being asked to do anything complicated).
01-12-2025 03:55 AM
You need to use vti in both sides
And use BGP to prefer one path than other.
That all what you need
MHM
01-12-2025 04:00 AM
both replying at the same time
Will look at the far end peering via BGP also (they currently don't)
When you meant VTI on both sides, it that between ASA and ISP1, then ASA and ISP2... or just configure on the ASA side for both tunnels?
01-12-2025 03:57 AM
Looking at VTI.... this looks interesting... we use crypto maps.
So I basically build 2 tunnels normally using VTI, then I can just static route out to whichever tunnel and weight the primary so it's primarily selected?
Apologies again, all new to me, I don't even know the relevant terminology.
01-12-2025 04:01 AM
You can use static route and weight it via one vti' but I prefer bgp it more fast and easy for failover if vti is down.
MHM
01-12-2025 04:02 AM
01-12-2025 04:10 AM
Thank you, will look into both options!
Also, thank you for the doc link !
01-12-2025 04:13 AM
Friend you are welcome
MHM
01-12-2025 04:08 AM
@Youreateapot418 the most elegant solution is to use VTI's with a routing protocol, but you can achieve the samething using crypto maps. On the spoke you define two peers, when the primary tunnel fails the ASA will failover to the secondary tunnel.
crypto map CMAP 1 set peer <primary ip> <secondary ip>
If you wish to fail back to the primary VPN tunnel when it is backup, you can use preempt. https://integrate.uk.com/asa-vpn-preempt/
01-12-2025 04:14 AM
Thanks Rob, I will look into this also! I'll be kicking myself if it's as simple as building a second tunnel separately, and just adding the secondary IP into Tunnel 1's crypto map.
01-12-2025 04:24 AM
@Youreateapot418 you don't build/configure a second tunnel, you add the secondary ip to the existing tunnel (on the spoke ASA). If the tunnel vis the primary goes down, it attempts to re-establish the tunnel but to the secondary IP.
You will also have the configure the routing on the DC side with the 2 ISP links, to failover routing if the primary link goes down.
01-12-2025 04:35 AM
ah!
can this tunnel have a different key also, or does it need to be the same? (there doesn't appear to be an option for this in ASDM, so probably have to do it at CLI level)
01-12-2025 04:49 AM
@Youreateapot418 the DC side (the ASA with 2 ISPs) would still establish a tunnel to the same IP address of the spoke ASA (the ASA with 1 isp), so having different PSKs would not work in this scenario. Certificates are stronger if you are concerned about security.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide