06-17-2013 09:20 AM - edited 03-04-2019 08:13 PM
Hi,
For a 2900 connected to two ISP's, how can I load balance traffic from an inside ASA to the ISP's so that traffic is more or less evenly distributed and also failover is taken care of if one ISP goes down.
Thanks.
Solved! Go to Solution.
06-17-2013 09:22 AM
This is often asked had you searched before asking
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_configuration_example09186a0080950834.shtml
06-17-2013 09:22 AM
This is often asked had you searched before asking
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_configuration_example09186a0080950834.shtml
06-17-2013 01:07 PM
Hi I tried this scenario in GNS3. Its does not work as mentioned in that link.
All wise the Inside traffic is getting nated to 1st ISP link only. If I shutdown that 1st ISP link then Inside traffic is getting nated to 2nd ISP link. How I can make effectively load balances between those links.
R2#sh ip nat translations
Pro Inside global Inside local Outside local Outside global
icmp 120.240.129.1:9 192.168.10.2:9 4.2.2.2:9 4.2.2.2:9
icmp 120.240.129.1:7 192.168.20.1:7 4.2.2.2:7 4.2.2.2:7
tcp 120.240.129..1:44553 192.168.10.2:44553 4.2.2.2:23 4.2.2.2:23
R2#
R2#sh ip route static
S* 0.0.0.0/0 [1/0] via 120.240.129.2
[1/0] via 58.159.199.2
R2#
R2#sh run | s nat
ip nat inside
ip nat inside
ip nat outside
ip nat outside
ip nat inside source route-map Tesing_F0/0 interface FastEthernet0/0 overload
ip nat inside source route-map Tesing_S0/0 interface Serial0/0 overload
R2#
R2#sh run | s permit
access-list 10 permit any
route-map Tesing_S0/0 permit 10
match ip address 10
match interface Serial0/0
route-map Tesing_F0/0 permit 10
match ip address 10
match interface FastEthernet0/0
R2#
R2#sh ver | i IOS
Cisco IOS Software, 2600 Software (C2691-ADVENTERPRISEK9-M), Version 12.4(25c), RELEASE SOFTWARE (fc2)
R2#
06-17-2013 03:23 PM
Hi When I instate traffic from inside to outside with different destination ip address at that time load balancing is happening between 2 ISP .
R2#
R2#clear ip nat translation *
R2#
R2#
R2#sh ip nat translations
R2#
R2#sh ip nat translations
Pro Inside global Inside local Outside local Outside global
tcp 120.240.129.1:28541 192.168.10.2:28541 1.1.1.1:23 1.1.1.1:23
R2#
R2#sh ip nat translations
Pro Inside global Inside local Outside local Outside global
tcp 120.240.129.1:28541 192.168.10.2:28541 1.1.1.1:23 1.1.1.1:23
tcp 58.159.199.1:58981 192.168.10.2:58981 4.2.2.2:23 4.2.2.2:23
R2#
R2#
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide