cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
514
Views
3
Helpful
4
Replies

EasyVPN :redundant head end servers recomendation for Hardware clients

mvsheik123
Level 7
Level 7

Hi All,

Scenario:

ASA5510 acting as EasyVPN server with static routes to inside networks (at various locations). No routing protocol on EasyVPn server. Pure static routes. The group & users list also Local to Server ASAs. Clients at homeoffice has 5505 as VPNclient (with NEM enabled) and everything works fine.

Iam lookig for a solution to add another EasyVPN server (ASA5510) at aother location, so that incase the primary server goes down, the client ASAs can go for the backup server. As we are using static routes to reach remote home office users (each remote location has /24 subnet assigned), Iam looking for better way to implement it.

I did some research, and looks like I need to go with RRI on Server ASAs (and take out all the static routes) , enable OSPF & redistribute static. Will it work that way. Any suggestions and any useful links with sample configs..?

Thank you in advance

MS

4 Replies 4

Yes, RRI on the EazyVPN server in this case would help.

If RRI is enabled, Whenever a NEM client connects the EazyVPN server puts a static route entry in its local routing table. Now if you are redistributing static in OSPF, then the routers running OSPF behind your EazyVPN server learns the routes dynamically for the subnets behind all the NEM clients.

And when a NEM client gets disconnected the route is automatically removed.

So as your number of NEM clients grow , you need not manually add static routes on all your devices.

Hi,

Thank you for the quick reply.Adding client routes is not an issue for me, as I simply used the summary route like

192.168.0.0/16 --> Server ASA inside interface. So client deployment is eazy.

My concern is if I have 2 server ASAs at 2 different locations...

1.learning internally each location via OSPF, incase when the primary ASA goes down, will the client be able to connect to second server ASA and can reach all the internal networks when RRI enabled..?

2. Also when both ASAs are up & running, will there be any issues in routing with RRI enabled on the internal networks..?

3. Any sample config links for enabling RRI on ASA ?

Thank you

MS

Apologies..forgot the main question.. using the RRI feature, do I still need 'nonat' ACL and split-tunnel ACL on the server ASA..?

Thank you

MS

Hi,

I have tested with a sample config with RRI enabled, as works fine. You definitely need 'nonat' and split-tunneling (if decided to use)configs. I used 'object-group' feature for that , so it is easy to manage. Another point observed was, on the Server ASA end, for OSPF config we need to use

'redistribute static subnets' without 'subnet' key word, the client subnet not advetising into OSPF AS.

Thank you

MS

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: