Our company has two ISPs. One provides FR, the other provides ADSL.
My intention is to route all business critical communications to the FR and route all other to the ADSL.
Business critical request can be classified with NBAR (for example http request going to cisco.com.)
I classify the packets coming from our LAN with a policy-map. (All selected URLs are set to ip precedence 5 - all other left with 0)
I also have a policy routing route-map on the LAN interface directing
- IP prec. 5, DNS and SMTP packets to the FR (if that's unavailable, the reroutes them to the ADSL)
- Other packets to the ADSL (if that's unavailable, the reroutes them to the FR)
The problem is the following:
When one of the interfaces is up, then we have everything running. At the time I bring up both WAN links the traffic marked with IP prec 5 has problems. We cannot access the marked domains, we don't have smtp...
Anyone configured something similar?
Someone notices an error in my config?
Here's the relevant part of my config:
class-map match-any work
match protocol http host "*.cisco.*"
set ip precedence 5
service-policy input work_notwork
ip policy route-map SERIAL-ADSL
access-list 110 permit ip any any precedence critical
access-list 110 permit tcp any any eq smtp
access-list 110 permit udp any any eq domain
access-list 110 permit tcp any any eq domain
access-list 111 deny ip any any precedence critical
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...