09-22-2021 10:07 AM
We're currently making our network more resilient. Our current setup is Single ASA with Single ISP. Our plan ahead and currently testing is utilizing 2 ASA configure FPR2000 series firewalls with port channel redundancy connected to a stacked C9200's.
Will port channels facilitate this dual ISP with HA pair failover or should we use port to port connectivity between the switches and firewalls? We have two site-to-site VPN's with static routes weighted to failover. We can establish BGP between the two ISP links and site-to-site VPNS. Failover is successful
Need a little help. We can manually fail over using this method. The second site-to-site comes up but only allows one way traffic.
09-22-2021 10:25 AM
Use IP SLA to track the ISP, if the first ISP fails the route will drop and automatically failover to the 2nd ISP.
Use Dead Peer Detection (DPD) to detect failure of a VPN peer and clear the IPSec SAs.
Use Reverse Route Injection (RRI) to advertise the remote networks on the connect tunnel. In the event of failover the routes will be removed from the first tunnel and re-added once the 2nd tunnel is up.
You will need to ensure you have your NAT exemption rules in place for both ISP interfaces, so traffic is not unintentially translated.
09-23-2021 06:48 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide