11-08-2009 08:23 AM - edited 02-21-2020 03:47 AM
I need to configure my ASA to get a second IP-peer to be as a backup for the VPN IPSec tunnel if the primary fails.
Any one can help?
Thank you.
Solved! Go to Solution.
11-08-2009 08:06 PM
Set a second peer in the crypto map:
"Configuring multiple peers is equivalent to providing a fallback list. For each tunnel, the security appliance attempts to negotiate with the first peer in the list. If that peer does not respond, the security appliance works its way down the list until either a peer responds or there are no more peers in the list."
http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c5.html#wp2193237
If the tunnel is already active and then the first headend fails, it will take a few minutes for the DPDs (dead peer detect) to sense the tunnel is down, but after this the failover should happen automatically; when the primary tunnel negotiations fails, it should go to the backup peer configured.
-heather
11-08-2009 08:06 PM
Set a second peer in the crypto map:
"Configuring multiple peers is equivalent to providing a fallback list. For each tunnel, the security appliance attempts to negotiate with the first peer in the list. If that peer does not respond, the security appliance works its way down the list until either a peer responds or there are no more peers in the list."
http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c5.html#wp2193237
If the tunnel is already active and then the first headend fails, it will take a few minutes for the DPDs (dead peer detect) to sense the tunnel is down, but after this the failover should happen automatically; when the primary tunnel negotiations fails, it should go to the backup peer configured.
-heather
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide