10-30-2017 11:44 PM - edited 03-08-2019 12:34 PM
Hello Guys, We want to accomplish this using Cisco 2911 router. We have the following networks: 172.16.2.0,172.16.3.0 - 172.16.7.0.
Our goal is to allow all these network to use the two isp links. If one isp link goes down, those network will be redirected to another isp link. All the lan networks must make use of the two links.
Access list is nat-add
Isp1 pool is mtn and isp2 pool is airtel
Route map for isp1is route-mtn
The route map statement matches the access-list nat-add with the next valid hop set to the gateway pointing to isp1
route-map for isp2 is route-airtel.
What access - list statement do we use for the isp2 since the route-map for isp1 is matching all the networks in the access-list, nat-add?
How do we define the ip sla monitor using track command in the default router? I know we will have two default routes, one pointing to isp1 and the other pointing to isp2?which default route will use the track command?
Any suggestions will be appreciated
10-31-2017 10:58 AM
Hi
Sorry but I'm not sure I get your point.
you have 2 ISPs and 3 LAN subnets : 172.16.2.0,172.16.3.0 and 172.16.7.0, is that right?
What trigger the traffic to go to ISP1 or ISP2? Will that be triggered by protocol (like http, ftp on 1 link and all others on another link)? Or will that be based on source IP or ....?
10-31-2017 09:50 PM
10-31-2017 12:20 PM
Hello,
both route maps need to match the same ACL, just the matching interfaces need to be different.
You need to track both routes, because either one might go down.
Post the full configuration, so we can add the necessary bits and pieces...
10-31-2017 01:32 PM - edited 10-31-2017 01:33 PM
Hello
@collinks2 wrote:
Hello Guys, We want to accomplish this using Cisco 2911 router. We have the following networks: 172.16.2.0,172.16.3.0 - 172.16.7.0.
Our goal is to allow all these network to use the two isp links. If one isp link goes down, those network will be redirected to another isp link.
How do we define the ip sla monitor using track command in the default router? I know we will have two default routes, one pointing to isp1 and the other pointing to isp2?which default route will use the track command?
Any suggestions will be appreciated
Given the your requirements the config below maybe applicable -
Apply sla to poll a wan address sourced from your primary wan interface
ip sla 1
icmp-echo 8.8.8.8 source-interface X/X <primary interface>
ip sla schedule 1 life forever start-time now
track 1 rtr 1 reachability
create ACL and NAT statements for dual wan links
access-list 100 permit ip 172.16.2.0 0.0.1.255 any
access-list 100 permit ip 172.16.4.0 0.0.3.255 any
route-map LAN permit 10
match ip address 100
match interface <primary interface>
route-map LAN2 permit 10
match ip address 100
match interface <secondary interface>
ip nat inside source route-map LAN interface <primary interface> overload
ip nat inside source route-map LAN2 interface <secondary interface> overload
Apply default static routes to primary and secondary wan links with tracking and admin distances values
ip route 0.0.0.0 0.0.0.0 x.x.x.x 1 name Primary track 1
ip route 0.0.0.0 0.0.0.0 y.y.y.y. 200
res
Paul
10-31-2017 02:19 PM
10-31-2017 02:47 PM
Hello,
if you want load balancing, you need both default routes to be up. They both need to be tracked. I would also install an EEM script that clears the NAT translations in case one of the links goes down, or, as an alternative, set the 'ip nat translation timeout' to a real low value.
So, the entire config could look like this:
track 1 ip sla 1 reachability
track 2 ip sla 2 reachability
ip sla 1
icmp-echo 8.8.8.8 source-interface X/X
ip sla schedule 1 life forever start-time now
ip sla 2
icmp-echo 8.8.8.8 source-interface Y/Y
ip sla schedule 2 life forever start-time now
access-list 100 permit ip 172.16.2.0 0.0.1.255 any
access-list 100 permit ip 172.16.4.0 0.0.3.255 any
route-map LAN permit 10
match ip address 100
match interface x
route-map LAN2 permit 10
match ip address 100
match interface y
ip nat inside source route-map LAN interface overload
ip nat inside source route-map LAN2 interface overload
ip route 0.0.0.0 0.0.0.0 x.x.x.x track 1
ip route 0.0.0.0 0.0.0.0 y.y.y.y. track 2
event manager applet IP_SLA1_DOWN
event track 1 state down
action 1.0 cli command "enable"
action 2.0 cli command "clear ip nat translation forced"
event manager applet IP_SLA2_DOWN
event track 2 state down
action 1.0 cli command "enable"
action 2.0 cli command "clear ip nat translation forced"
10-31-2017 09:46 PM
10-31-2017 02:51 PM
Hello
"We don' want the secondary to be redundant. We want the two to be up at the same time."
Then I would suggest to still use a primary default with the track and admin option for you default traffic and ALSO incorporate PBR for the certain lan subnets you wish to utilize the secondary ISP link
As such then the configuration will need to incorporate PBR with Tracking
Please review my post from this ticket - here
res
Paul
res
Paul
10-31-2017 09:44 PM
11-01-2017 02:17 AM - edited 11-01-2017 02:18 AM
Hello
@collinks2 wrote:
Hello Paul driver,
I have read the post in that ticket. However, I will ask questions in that
thread. For this thread, there is something I need you to clear me on.
icmp-echo 8.8.8.8 and
icmp-echo source-ip
What is the difference between the two cos 8.8.8.8 is a public DNS server
while the source-ip is ip address of the wan interface of the router?
Icmp-echo <destination ip of host you would like to poll source-ip/interface <source you wish to orignate poll)
I just used google dns as an example, However you would poll a prefix you know resides off/ is reachable from your primary wan interface
res
Paul
11-01-2017 02:50 AM
11-01-2017 03:05 AM
11-02-2017 03:09 AM
Hello Paul driver ,
In case a company policy states that "all the http and https traffic from all users should route across isp1 (slower internet connection) while all other ip traffic should be allowed to route across isp2 (faster internet connection)
see the attached config file which i did with reference to the one you posted in another thread.
thanks in anticipation
11-02-2017 04:38 AM
I would add that a single match on IP SLA is not very reliable. 8.8.8.8 and other global DNS providers often filter ICMP, so a dual positive usually prevents path stability issues. Also, since you need both default routes to be removed during their individual outage and load balancing to occur, you need something more complex.
Dual Match with clean failover (make sure it is really down or up before dropping):
Path 1 validation:
track 1 ip sla 1 reachability
delay down 15 up 60
!
track 2 ip sla 2 reachability
delay down 15 up 60
!
! (or means the track will be up if one "or" the other is up)
track 3 list boolean or
object 1
object 2
!
ip sla 1
icmp-echo 8.8.8.8 source-ip {CE Internet interface #1 IP}
threshold 1000
timeout 1000
frequency 5
ip sla schedule 1 life forever start-time now
ip sla 2
icmp-echo 4.2.2.2 source-ip {CE Internet interface #1 IP}
threshold 1000
timeout 1000
frequency 5
ip sla schedule 2 life forever start-time now
!----- Path 2 validation------:
track 5 ip sla 5 reachability
delay down 15 up 60
!
track 6 ip sla 6 reachability
delay down 15 up 60
!
! (or means the track will be up if one "or" the other is up)
track 7 list boolean or
object 5
object 6
!
ip sla 5
icmp-echo 8.8.8.8 source-ip {CE Internet interface #2 IP}
threshold 1000
timeout 1000
frequency 5
ip sla schedule 5 life forever start-time now
ip sla 6
icmp-echo 4.2.2.2 source-ip {CE Internet interface #2 IP}
threshold 1000
timeout 1000
frequency 5
ip sla schedule 6 life forever start-time now
!
! ---- Load balanced routing
!
ip route 0.0.0.0 0.0.0.0 {ISP#1 PE IP} 100 track 3
ip route 0.0.0.0 0.0.0.0 {ISP#2 PE IP} 100 track 7
!
! failover route, just in case you IP SLA fails to function as desired and you need a back door
ip route 0.0.0.0 0.0.0.0 {ISP#1 PE IP} 200
let us know how this is working our for you.
Cheers,
P
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide