Fail Over Ipsec Site-To-Site VPN With Backup Peer On Cisco Asa
Fail Over Ipsec Site-To-Site VPN With Backup Peer On Cisco Asa
ASA
1. Overview:
In this scenario, the corporation has many branches in many places. And at each branch, they
use the firewall Cisco ASA configured failover active-standby. In HQ, they have two small sites
A and B, at each site, they place one firewall Cisco ASA.
To backup for link internet from the Branch site to ISP, we must deploy two links with two
different ISP. Each ISP provides one public IP address.
For each IP address, we set up two Ipsec VPN links from Brach’s firewall to two firewalls at HQ.
Failover case:
2. Configuration Task:
- Setup connection, ip address, dhcp, routing ospf on the Firewall and router.
- Configure failover active-standby between two firewalls BR-AC and BR-SB.
- Setup VPN l2l on Firewall BR-AC with two peer HQ-A and HQ-B for interface outside_1
connect to ISP1.
- Setup VPN l2l on Firewall BR-AC with two peer HQ-A and HQ-B for interface outside_1
connect to ISP2.
- Configure IP SLA tracking ip address gateway ISP1 and the ip address of HQ-A on
Firewall BR-AC.
- Setup VPN l2l on Firewall HQ-A with two peer interface outside_1 and outside_2 of
Firewall BR-AC.
- Setup VPN l2l on Firewall HQ-B with two peer interface outside_1 and outside_2 of
Firewall BR-AC.
- Configure IP SLA tracking ip address gateway ISP and the ip address of interface
outside_1 on Firewall HQ-A, HQ-B.
3. Configuration and Verification:
RTR-BB
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 172.18.101.2 255.255.255.252
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 10.92.100.253 255.255.255.0
!
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
!-----------------Configure routing------------------!
sla monitor 10
type echo protocol ipIcmpEcho 172.18.101.1 interface outside
timeout 1000
frequency 3
sla monitor schedule 10 life forever start-time now
!
track 10 rtr 10 reachability
route outside 0.0.0.0 0.0.0.0 172.18.101.1 1 track 10
!
router ospf 2
network 10.92.100.0 255.255.255.0 area 0
log-adj-changes
default-information originate metric 10
!
!-----------------Configure VPN Ipsec l2l------------------!
crypto ikev1 enable outside
!
crypto ikev1 policy 1
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
!
tunnel-group 172.19.101.254 type ipsec-l2l
tunnel-group 172.19.101.254 ipsec-attributes
ikev1 pre-shared-key *****
!
tunnel-group 172.19.102.254 type ipsec-l2l
tunnel-group 172.19.102.254 ipsec-attributes
ikev1 pre-shared-key *****
!
object network 10.92.92.0_24
subnet 10.92.92.0 255.255.255.0
object network 10.177.177.0_24
subnet 10.177.177.0 255.255.255.0
!
access-list 100 extended permit ip object 10.92.92.0_24 object 10.177.177.0_24
!
crypto ipsec ikev1 transform-set myset esp-aes esp-sha-hmac
crypto map outside_map 10 match address 100
crypto map outside_map 10 set pfs
crypto map outside_map 10 set peer 172.19.101.254 172.19.102.254
crypto map outside_map 10 set ikev1 transform-set myset
crypto map outside_map interface outside
!
nat (inside,outside) source static 10.92.92.0_24 10.92.92.0_24 destination static
10.177.177.0_24 10.177.177.0_24 no-proxy-arp route-lookup
!
!-----------------Configure monitor primary peer------------------!
sla monitor 100
type echo protocol ipIcmpEcho 172.19.101.254 interface outside
timeout 1000
frequency 3
sla monitor schedule 100 life forever start-time now
!
track 100 rtr 100 reachability
route outside 172.19.102.254 255.255.255.255 169.254.255.254 1 track 100
HQ-B
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 172.18.102.2 255.255.255.252
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 10.92.100.254 255.255.255.0
!
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
!-----------------Configure routing------------------!
sla monitor 10
type echo protocol ipIcmpEcho 172.18.102.1 interface outside
timeout 1000
frequency 3
sla monitor schedule 10 life forever start-time now
!
track 10 rtr 10 reachability
route outside 0.0.0.0 0.0.0.0 172.18.102.1 1 track 10
!
router ospf 2
network 10.92.100.0 255.255.255.0 area 0
log-adj-changes
default-information originate metric 20
!
!-----------------Configure VPN Ipsec l2l------------------!
crypto ikev1 enable outside
!
crypto ikev1 policy 1
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
!
tunnel-group 172.19.100.254 type ipsec-l2l
tunnel-group 172.19.100.254 ipsec-attributes
ikev1 pre-shared-key *****
!
object network 10.92.92.0_24
subnet 10.92.92.0 255.255.255.0
object network 10.177.177.0_24
subnet 10.177.177.0 255.255.255.0
!
access-list 100 extended permit ip object 10.92.92.0_24 object 10.177.177.0_24
!
crypto ipsec ikev1 transform-set myset esp-aes esp-sha-hmac
crypto map outside_map 10 match address 100
crypto map outside_map 10 set pfs
crypto map outside_map 10 set peer 172.19.100.254
crypto map outside_map 10 set ikev1 transform-set myset
crypto map outside_map interface outside
!
nat (inside,outside) source static 10.92.92.0_24 10.92.92.0_24 destination static
10.177.177.0_24 10.177.177.0_24 no-proxy-arp route-lookup
!
!-----------------Configure monitor primary peer------------------!
sla monitor 100
type echo protocol ipIcmpEcho 172.19.101.254 interface outside
timeout 1000
frequency 3
sla monitor schedule 100 life forever start-time now
!
track 100 rtr 100 reachability
route outside 172.19.102.254 255.255.255.255 169.254.255.254 1 track 100
BR-AC
!-----------------Configure failover------------------!
interface GigabitEthernet0/0
description LAN/STATE Failover Interface
!
failover
failover lan unit primary
failover lan interface LANFAIL GigabitEthernet0/0
failover key *****
failover link LANFAIL GigabitEthernet0/0
failover interface ip LANFAIL 192.168.1.1 255.255.255.0 standby 192.168.1.2
BR-SB
Verification:
Test case: Normal
PC1> ping 10.177.177.1