Our main office has a Cisco ASA 5505 with IPSec tunnel connected to a remote office with a failover ADSL and wireless broadband connection. I am able to successfully establish the IPSEC tunnel over both the remote ADSL or wireless connection if configured independantly on the ASA 5505.
I have created 2 IPSec tunnel''s on the ASA to handle both of the WAN IP Addresses in the event of the remote site failing over to the second connection. The problem lies in the IPSEC Rule. You can only configure 1 remote host IP per rule. I have created 2 rules with a different priority number. however when the WAN address on the remote site changes the ASA does not recognise the lower priority IPSEC rule and hence the VPN connection does not establish itself. If I change the priority of the IPSEc rule at this point the VPN connects. I would like to achieve this automatically or configure things in the correct way which would allow me to achieve this.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...