Most of the documentation I've found on this subject deals with 1 ASA with multiple ISP connections. Here is my scenario -
192.168.0.1/24 - ASA1 - ISP1 - \
----- site to site VPN ------ ISP - ASARemote - 192.168.10.1/24
192.168.0.1/24 - ASA2 - ISP2 - /
Is it possible to have two separate ASAs on different ISP connections, pointing to the same internal LAN setup for site to site VPNs? I'd like the remote site to have both peers and only use one. It seems like it should be possible, but I can't find the documentation from Cisco so far.
I know I could just setup two site to site VPNs on the remote site, but I'm unsure on the monitoring of the interfaces and failover.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...