Home office WAN/VPN failover (Cisco ASA) - design

A customer is looking for an improved home teleworker solution beyond the current point-to-point T1 data connections to the main office. The plan is to deploy a secondary connection to each home over broadband cable (over Mediacom/US), and have this higher-speed link provide the primary connection over VPN. If this connection drops, they'd like the existing T1 connection to serve as the backup, and have connectivity immediately fail-over.

The main office is currently being served by a Cisco ASA 5520, and an ASA 5505 can be deployed at each home office to provide for the VPN connection over the cable connection. The existing connection looks like this:

      Main --- T1 router ------WAN------- T1 router ----Home

Adding an ASA to this at the home office would possibly look like the following:

     Main --- T1 router ------ WAN ------T1 router ----ASA ----home PC
          |                                                                      |  
           ---- ASA ------------ Internet ---------------Cable modem

So, the new ASA at the home office would front both the T1 (non-VPN) connection as well as the VPN connection over the new cable connection.  I need to resolve the following questions:

1) Will the above design work?  Can an ASA be configured to send all data over a VPN connection, and then somehow when the VPN drops, start sending data over the unencrypted T1 WAN connection?  (Plus, failing back to the cable connection when it becomes available once more...)

2) If so, looking for some configuration guidance for the ASA on how this would be accomplished.

Thank you - reference links/docs are always appreciated.
cfan73Asked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

rscottvanCommented:
Here's an article describing how to configure the WAN failover:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml

I'm thinking you can just create a tunnel on the cable side and route traffic to it, and let traffic drop when you route over the T1, since it's private.  If you need a tunnel on both sides, just build 2 tunnels, and set up the routing to send traffic to the cable tunnel first, then the T1 tunnel if the cable connection drops.

Here's another article with a VPN as well:
http://www.petenetlive.com/KB/Article/0000544.htm
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
cfan73Author Commented:
Thanks for the response.

I've seen the first document before, and the current situation differs in that the backup circuit  is not a 2nd Internet service provider, but a direct WAN connection back to the main site. (Thus, it's already there and terminated by a local 1721 router, and wouldn't have to pass through the new 5505 ASA.)  I'm not sure if this changes the design/configuration, but it might...

Would this work?:

- Configure IP SLA across the new (VPN) connection to the outside interface of the head-end ASA, with link tracking.
- Configure a default route on the ASA to this same interface IP.
- Configure static route(s) on the ASA w/ a higher administrative distance (so, floating)
to the remote nets over the T1 WAN connection.

Thanks again
0
cfan73Author Commented:
bump for additional input?
0
QlemoBatchelor, Developer and EE Topic AdvisorCommented:
I've requested that this question be deleted for the following reason:

The question has either no comments or not enough useful information to be called an "answer".
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Network Architecture

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.