- Asa Isp Redundancy Rules
- Cisco Asa Dual Isp Redundancy
- Asa Isp Redundancy Definition
- Asa Isp Redundancy Meaning
Solved: Hello, if there anyway to configure site-to-site vpn redundancy using a cisco asa. I know that I can configure redundancy using two ISP on my cisco ASA but pointing to the same peer, but what about if I need to point to different peers but. We have 1 asa 5510 and 1 asa 5505 both have software version 8.04. The side with the 5505 has two isp's and the the side with the 5510 has 1 isp directly connected to the asa. The goal is that the 5505 will be able to keep a tunnel alive even if one of the internet connections go down. The Cisco ASA has been around for quite some time and is a popular SMB and Enterprise device. This appliance-based firewall supports redundant or backup ISP links in an active/standby configuration. Older editions like the ASA 5510 to the newer 5500-X Series running software Version 9.x or later easily support this feature.
Introduction
Asa Isp Redundancy Rules
Awesome very nice article, I have a question with this HA fail-over configuration, I also have dual link with two separate ISP, and I would like to setup for redundant backup ISP link. Could you please advise and provide the step to configure ASA. Greatly appreciate your response. 2 Cisco ASA 5520's with ASDM 8 (4 port gige ports each) 2 ISP's (Bonded t1's @ 3mg, ISP w/eithernet @10megs seperate wan Subnets IE 12.240.X.X and 206.170.x.x both /28) 4 servers for DMZ (New) Best protocol that all equipment has in common is EIGRP Task: Build secure, redundant access to internet with Loadbalancing, fail over and high access to.
This document describes how to configure a redundant site-to-site (LAN-to-LAN) IPSec IKE Version 1 (IKEv1) VPN using Virtual Tunnel Interface (VTI) between two Cisco ASA. ASA VPN module was enhanced with this logical interface in version 9.7(1) and is used to create a VPN tunnel to a peer, supports route based VPN using profiles attached to VTI interfaces. More details can be found on Release Notes for ASA software 9.7(1).
Objective
Traffic between HQ and DR should pass across primary IPSec tunnel using ISP A. In the case the link through ISP A fails, traffic between sites should failover to the secondary link (ISP B) using backup tunnel.

Components used:
Cisco Asa Dual Isp Redundancy
- Cisco ASAv version 9.7(1);
- vPC
Configuration
This article is using network topology shown bellow:
HQ ASA Configuration
First, we have to add IPSec configuration for Phase 1 and 2:
for VTI interfaces configuration we are using a new feature introduced in version 9.7(1), 31-bit Subnet Mask (“For routed interfaces, you can configure an IP address on a 31-bit subnet for point-to-point connections.”, more information on Release Notes):
to check connectivity to primary interface of our peer we use IP SLA and a track object:
then, add routes to destination networks/addresses:
DR ASA Configuration
For DR ASA configuration is similar to HQ ASA, only ip addresses are changed:
Verifying the results

State of IKEv1 Phase 1 and Phase 2 can be checked with following commands:
Asa Isp Redundancy Definition
and interfaces status:
You might also see:
Asa Isp Redundancy Meaning
I hope to be helpful.

Comments are closed.