Well, here goes...I have two T1s going to two different sites coming back to my central site. I also have two firewall devices at these sites for Internet access.
I would like to set up two VPNs and sue the T1s as failover. It was suggested that I use OSPF as the failover routing protocol. I setup one connection using DOC ID: 63882 which describes VPN/IPSEC with OSPF and it works great. I've has several instances where the Internet went down and and the T1 kicked in and maintained connectivity with the central site. The problem seems to be it won't scale past one site to site connection.
I then though I would try a GRE tunnel to pass OSPF to the other site but without traffic to pass the tunnel will not come up since the T1 is passing all of the traffic in its direction.
I am using a ASA5510 at the central site and ASA5505s at the remotes. It almost looks like routers may have been a better choice.
Router would have been easier (IMO), you could have used DMVPN. Anyways, there are multiple configuration example for multiple tunnels. They don't all cover OSPF, but it sounds like you've got that part covered.
I'm getting that impression that I should have gone router but my experience is mostly with firewalls and PIX/ASA. Thanks for your help. Sure wish there was something easier for ASA/PIX. But, after all, they are not routers.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :