Remote Site-2 ISP-Redundant IPSEC Tunnel - Failover Fail - SA Up
Remote Site - to HQ - Redundant ISP
I have am having an issue with a remote site redundant IPSEC tunnel config. When the remote site is on the primary IPSEC tunnel, the traffic from Host A to Host B is successful. When the primary link fails, the second tunnel can be established but host to host communication fails. I should mention that when I initiate the fail over at the remote site by pulling the plug, I have to run packet tracer to get the tunnel to come over the backup ISP. The tunnel is created and the SA is active however the host traffic does not get reassigned. I am using an SLA and a track to test reach ability and remove the static route. The remote host's DG is the inside interface of the remote fw. Could anyone shine some light on what I may be missing. Here is the config and I appreciate any help.
crypto map map-outside 100 match address to-remote-site-interesting traffic crypto map map-outside 100 set peer 220.127.116.11 18.104.22.168 crypto map map-outside 100 set ikev1 transform-set vpn-l2l
tunnel-group 22.214.171.124 type ipsec-l2l tunnel-group 126.96.36.199 ipsec-attributes ikev1 pre-shared-key *****
tunnel-group 188.8.131.52 type ipsec-l2l tunnel-group 184.108.40.206 ipsec-attributes ikev1 pre-shared-key *****
Threat Response Basics
What is Threat Response and how can it help my organization?
What is the cost of Threat Response?
What are the deployment options for Threat Response?
Is Threat Response available outside of the United States?
Gartner has once again named Cisco a Leader in the Magic Quadrant for Network Firewalls. This distinction recognizes Cisco's ingenuity in redefining the firewall as the basis for an integrated security platform.
Find out how Cisco stands out from the comp...
Hi experts,I would like any suggestions on this topology. We are is the middle of replacing our old ASA5520 with the new FirePower. Our current firewall terminate our IPsec tunnels and the GRE is terminated on the first inside router's loopback on the sec...
Hi All, A customer wants to authenticate Anyconnect VPN users from an ASA using the client installed certificate and then with AD. i.e. Is this a corporate device?Would we recommend authenticating the cert on the ASA then passing the AD check to ISE ...
Hello Team, we are getting alert in FMC stating policy deployment failed, we are running on 6.2.0 version and not sure which version is stable version to re mediate this issue, in one event i have seen restart will resolve this issue but is it perman...