hostname R1_ISP1
!
boot-start-marker
boot-end-marker
!
no logging buffered
enable secret XXXXXXXXXXXXXXXXXXXXXXXXXXXx
!
ip name-server 4.2.2.2
ip name-server 8.8.8.8
!
username admin privilege XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXxx
!
!
track 1 interface Tunnel0 line-protocol
!
track 2 interface Tunnel1 line-protocol
!
no crypto isakmp ccm
!
!
!
!
interface Tunnel0
description Connection to ISP DIA
ip unnumbered FastEthernet0/0
ip tcp adjust-mss 1400
keepalive 10 3
tunnel source 192.168.X.X
tunnel destination 192.168.X,X
!
interface Tunnel1
description Connection to ISP Wireless Backup
ip unnumbered FastEthernet0/1
ip tcp adjust-mss 1452
keepalive 10 3
tunnel source 192.168.X.X
tunnel destination 192.168.X.X
!
interface FastEthernet0/0
description *Connection to ISP-DIA
ip address 192.168.X.X 255.255.255.252
!
interface FastEthernet0/1
description *Connection to ISP- Wavelan
ip address 192.168.X.X 255.255.255.252
!
interface FastEthernet0/0/0
load-interval 30
duplex full
speed 100
!
interface FastEthernet0/0/1
duplex full
speed 100
!
interface FastEthernet0/0/2
!
interface FastEthernet0/0/3
!
interface Vlan1
description $ES_LAN$
ip address 100.100.100.101 255.255.255.240
!
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.X.X track 1
ip route 0.0.0.0 0.0.0.0 192.168.X.X 100 track 2
line con 0
password XXXXXXXXXXXXXXXXXXxx
login
line aux 0
line vty 0 4
password XXXXXXXXXXXXXXXXXXXXXxxx
login
!
end
vlan 2
!
int fa0/0/3
description Link to ISP2
switchport mode access
switchport access vlan 2
no shutdown
!
int vlan 2
ip address a.b.c.d 255.255.x.y
!
int vlan 1
ip policy route-map Web_Traffic_Map
!
ip access-list extended Web_Traffic
permit tcp host <ASA_WAN_IP> any eq http
permit tcp host <ASA_WAN_IP> any eq https
!
route-map Web_Traffic_Map permit 10
match ip address Web_Traffic
set ip next-hop <ISP2 Gateway>
!
This is just a rough outline. Â You'd need to configure NAT on the VLAN1 and VLAN2 interfaces for the link to the 2nd ISP to work properly. Â That may need you to adjust your Fa0/0 and Fa0/1 interfaces though to move the public IP addresses from the ASA to these interfaces to get this working properly, but as you have tunnel interfaces to your ISP you'd need to request that the ISP adjust their end too, and based on the config you have given me I think it may affect their failover.
One of the more interesting things that some desire to achieve with policy based routing in IOS is routing by traffic type. Â For example, traffic to port 80 and 443 might go to isp2. Â All other traffic could go to isp1. Â This can be accomplished in the ASA by using a configuration similar to the following.
//delete the previous destination translation
ASA(config)#no static (isp2,inside) 128.0.0.0 128.0.0.0 netmask 128.0.0.0
//create destination translations that include tcp/udp ports
static (isp2,inside) tcp 0.0.0.0 80 0.0.0.0 80 netmask 0.0.0.0
static (isp2,inside) tcp 0.0.0.0 443 0.0.0.0 443 netmask 0.0.0.0
Unlike IOS based routers, the ASA does not support policy based routing. Â While this certainly creates limitations, there are options that will allow an administrator to achieve some of the same goals. Â Prior to implementing destination translation or destination translation exemptions, it is very important to understand the proxy arp behavior on the ASA. Â When a destination translation or exemption exists, outbound packets use the entry to determine the egress interface. Â Once the egress interface is chosen, the ASA does a route lookup specific to the chosen interface. Â By understanding these interactions, an administrator can use destination translation exemptions to steer packets to the desired interface. Â This can alleviate some of the limitations found in the ASA.
Also you can configure dynamic routing with your ISPs if they agree and make one prior to another, configure NAT for Proxy for each destination.
And at last third option is to configure static default routes to ISPs with object tracking. Here is a link http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml#cli