I had a frustrating time with my 5505 trying to add a new ISP at the primary while retaining the original ISP as a redundant connection. It really didn't seem too difficult, but it just didn't work.
I followed Document ID 70559, but as soon as I applied changes to enable the new primary ISP with a lower metric than the original backup, I lost connectivity. Of course, I did confirm with the new ISP that they could ping the external interface and they were able to.
In short, I renamed the existing interface from Outside to Backup and created a new interface called Primary, adding the static external IP to that interface (the same IP that the ISP said they could ping). I then added a static route for the Primary, with the new gateway (which the ISP could also ping). Primary had a metric of 1. I changed Backup to a metric of 10. The only thing I didn't do to the Primary route was set the Tracked option as I wanted to first ensure that I was only working with the Primary interface. Once the Primary works, I'll add Tracking which is the whole point of this process. When I clicked Apply, I lost internet connectivity from the workstation (by domain name or IP). I set Backup to a metric of 1 and Primary to a metric of 10 and connectivity returned. Quite a remedial question (another set of eyes is always helpful!), but I am correct in assuming that nothing needs to change on the workstation? The workstation's gateway is the ASA's internal IP, the 5505 should handle it from there, right?
Let me know if something jumps out at you, or what configs you would like to see (and if you would like them in the current/operational mode or in the preferred/nonfunctional mode). The latter would need to be provided off hours, of course.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...