cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1190
Views
0
Helpful
5
Replies

Resilient ASA IPSec Solution

drbabbers
Level 3
Level 3

Here is the scenario...

I have a client site with a Cisco ASA 5505 VPN that has a single IPSec tunnel back to a HQ VPN.

I would like to introduce a 2nd tunnel from the client site to another HQ location that advertises the same set of routes.

From an ASA VPN point of view, what is the best approach for this?

Load balancing or an Active/Standby approach will be acceptable.

Im curious to know how 2 static VPN tunnels will work side by side with the same crypto maps? Will this even work?

Can I influence this using good old fashion routing?

Help! :P

Thanks!

D

1 Accepted Solution

Accepted Solutions

Yes, thats where the second peer has to be added.

View solution in original post

5 Replies 5

If you wan't anything fancy with routing, you should build your VPNs with routers and use IPSec-Tunnel-interfaces.

For the ASA, the options are limited. If both destinations have the same internal addresses, you have to add a second peer to your existing crypto-map sequence. If the first peer is not reachable any more, the second peer is used.

HI Karsten,

It sounds like your 2nd option will do the job! How do I add a second peer to an existing crypto-map sequence?

Thanks!

D

Just issue the actual "set peer" command a second time with the additional address.

After that your crypto map sequence holds both peers. The first one will be the primary by default.

Thanks Karsten. I think I have located this in the ASDM.

Site to Site VPN -> Advanced -> Crypto Maps -> Edit ->

'IP Address of Peer to be added: _ _ _ _'

Does this sound about right?

D

Yes, thats where the second peer has to be added.