Link to home
Start Free TrialLog in
Avatar of MACROLEVEL
MACROLEVELFlag for United States of America

asked on

ASA 5505 Dual ISP setup

Hi,

I need help setting up my ASA5505 Sec+ license to work with 2 ISPs. Right now it works just fine with one WAN interface, and I set second one as backup but not getting any traffic through WAN2 (backup 0/2). Both ISPs provide dynamic IP address and I set ASA to obtain IP address for "outside" and "backup" via DHCP. I need ASA set to switch over second ISP link ("backup" when first one is done or there is some problem and the traffic is not going through it. When primary ISP ("outside") is back, ASA should switch to primary ISP back.

Thanks.
Result of the command: "sho run"
 
: Saved
:
ASA Version 8.0(4) 
!
hostname asa
enable password OmnnXRU1dg.mR encrypted
passwd 2KFQn.2KYOU encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.2.1 255.255.255.0 
 ospf cost 10
!
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute 
 ospf cost 10
!
interface Vlan3
 nameif backup
 security-level 0
 ip address dhcp setroute 
 ospf cost 10
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
 switchport access vlan 3
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
banner login  **************************************************************************************
 
ftp mode passive
clock timezone EST -4
clock summer-time EDT recurring
access-list icmp_permit extended permit icmp any any 
access-list SSL extended permit tcp any any eq ssh 
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu backup 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-615.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
access-group icmp_permit in interface outside
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.2.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh 192.168.2.0 255.255.255.255 inside
ssh timeout 5
console timeout 30
dhcpd auto_config outside
!
dhcpd address 192.168.2.11-192.168.2.99 inside
dhcpd auto_config outside interface inside
dhcpd enable inside
!
 
threat-detection basic-threat
threat-detection statistics port
threat-detection statistics protocol
threat-detection statistics access-list
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 128.156.1.43 source outside
ntp server 192.5.41.209 source outside prefer
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect pptp 
  inspect icmp 
policy-map global-policy
!
service-policy global_policy global
prompt hostname context 
Cryptochecksum:2630978e604ed5354d2c71e639c10997
: end

Open in new window

ASKER CERTIFIED SOLUTION
Avatar of th3w01f
th3w01f
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of MACROLEVEL

ASKER

I already found this example

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml

but I do not have enough experience to follow it. I need detailed instructions either using CLI or ASDM how to set it up for dynamic IPs. My first provider is cable with modem in bridged mode, second (backup) line is DSL with some kind of router built-in and DHCP server . I do see both IP addresses inside ASDM so ASA did assign them to appropriate interfaces.
I haven't tested this but I believe this is all you're missing.  

global (backup) 1 interface

route outside 0.0.0.0 0.0.0.0 <Default Gateway of outside from DHCP> 1 track 1

route backup 0.0.0.0 0.0.0.0 <Default Gateway of backup from DHCP> 254

(This route has an administrative distance of 254 so it will not be used if the route with an AD of 1 is available.)

sla monitor 123
 type echo protocol ipIcmpEcho <external IP you want to monitor to verify that outside is up> interface outside
 num-packets 3
 frequency 10

sla monitor schedule 123 life forever start-time now
track 1 rtr 123 reachability
Is the GW address for dynamic WAN IPs always permanent? I mean, periodically I'm getting new IP address from ISP. Will the GW address change as well so I have to change it on ASA as well? Also, is there a way to see what is the GW address from ASA for each outside interface?
One of the problems with DHCP on the WAN is that your providers will most likely change you're IP from time to time; if they keep you in the same subnet youll be fine.  You may want to look into the cost of getting a static IPs.

You should be able use the command show route outside to determine your gateway
So could we also enable the following:

crypto map vpn interface outside
crypto map vpn interface backup
crypto isakmp enable outside
crypto isakmp enable backup

Would it move the tunneling over to the backup ISP?