Dual ISP Bandwidth Agreggation
Hi, my name is John. We have 1 uplink connected to a Cisco 1900 series router and another 1 uplink connected to a Cisco 2000 series router. Two uplink from 2 different ISP. 1 uplink has static WAN IP while the other 1 has dynamic WAN IP. They are then link to ASA and then from ASA to switches. My question is how can i configure the routers or ASA to combine the bandwidth of two uplinks
Hi Reza,
Thanks for your feedback.
In the case if both uplinks are coming from the same ISP, can we use
1.dual internet links NATing with PBR and IP SLA
https://supportforums.cisco.com/document/32186/dual-internet-links-nating-pbr-and-ip-sla
2.Load balancing using Performance Routing pfr/OER
https://supportforums.cisco.com/document/32216/load-balancing-using-performance-routing-pfroer
In my case, since the uplinks are from different ISPs, can i do failover on either ASA or the routers, such that when 1 uplink fail, it will automatically be tracked and switch the internet traffic from the 2nd uplink?
Similar Messages
-
VPN device with dual ISP, fail-over, and load balancing
We currently service a client that has a PIX firewall that connects to multiple, separate outside vendors via IPSEC VPN. The VPN connections are mission critical and if for any reason the VPN device or the internet connection (currently only a T1) goes down, the business goes down too. We're looking for a solution that allows dual-ISP, failover, and load balancing. I see that there are several ASA models as well as the IOS that support this but what I'm confused about is what are the requirements for the other end of the VPN, keeping in mind that the other end will always be an outside vendor and out of our control. Current VPN endpoints for outside vendors are to devices like VPN 3000 Concentrator, Sonicwall, etc. that likely do not support any type of fail-over, trunking, load-balancing. Is this just not possible?
Unless I am mistaken the ASA doesn't do VPN Load Balancing for point-to-point IPSec connections either. What you're really after is opportunistic connection failover, and/or something like DMVPN. Coordinating opportunistic failover shouldn't be too much of an issue with the partners, but be prepared for lot of questions.
-
Performance Routing (PfR) with single router, dual ISP and load balancing
It looks like PfR can do this but I have only found information about this feature which will start using ISP2 once ISP1 reaches 75% usage. But this is not load balancing.
Can we accomplish load balancing utilizing a single router with dual ISPs using this PfR feature?
Or do we have to use another feature?
thank you in advanceDisclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
I'm rusty using OER/PfR, but I recall it could load balance two links on same router. The issue, I also recall, if doing BGP, OER/PfR has to detect a load imbalance, and there's a certain difference allowance, and OER/PfR takes some time to decide, so depending on actual traffic, it might not be obvious it's working. If doing BGP, there's a hidden command (which I don't recall is) that will load balance the two links on the same router; then you use OER/PfR to dynamically refine the balance load. -
I have one Hub Router, I have 2 ISPs and would like to set it up as a dual hub. I have configured two tunnel interfaces on the hubs and spokes, set the ipsec profile to shared, etc.
What i was trying to do was route-map the traffic for the two tunnel interfaces out of the relevant interfaces and came up with the following:
route-map ROUTE-DMVPN permit 10
match interface Tunnel1
set ip default next-hop xxxxx
route-map ROUTE-DMVPN permit 20
match interface Tunnel2
set ip default next-hop xxxxx
and then set that as a local policy route-map on the router.
The first section matches packets and works, the second does not. Is what I am trying to do possible? Or Do I need to be more sophisticated in my design?
Thanks in advance!OK, here is something I came up really fast in my lab.
Note that it does NOT contain best practices or some required configurations and is only meant to show a concept.
Here is the situation
hub ===== two links ==== "ISP" -----one link ---- spoke
hub physical:
10.1.1.0/24 (ISP1)
10.2.2.0/24 (ISP2)
spoke physical:
10.3.3.0/24
two DMVPN clouds:
172.16.1.0/24
172.16.2.0/24
Hub lan:
99.99.99.0/24
spoke lan:
88.88.88.0/24
Hub configuration:
interface Ethernet0/0 ip address 10.1.1.1 255.255.255.0interface Ethernet1/0 ip vrf forwarding ISP2 ip address 10.2.2.1 255.255.255.0interface Ethernet2/0 ip address 99.99.99.1 255.255.255.0interface Tunnel1 ip address 172.16.1.1 255.255.255.0 no ip redirects ip nhrp map multicast dynamic ip nhrp network-id 1 ip nhrp server-only delay 1000 tunnel source Ethernet0/0 tunnel mode gre multipoint tunnel key 1endinterface Tunnel2 ip address 172.16.2.1 255.255.255.0 no ip redirects ip nhrp map multicast dynamic ip nhrp network-id 2 delay 2000 tunnel source Ethernet1/0 tunnel mode gre multipoint tunnel key 2 tunnel vrf ISP2endrouter eigrp 100 network 99.99.99.0 0.0.0.255 network 172.16.1.0 0.0.0.255router eigrp 101 network 99.99.99.0 0.0.0.255 network 172.16.2.0 0.0.0.255ip route 0.0.0.0 0.0.0.0 10.1.1.254
ip route vrf ISP2 0.0.0.0 0.0.0.0 10.2.2.254
Spoke config:
interface Ethernet0/0 ip address 10.3.3.1 255.255.255.0endinterface Tunnel1 ip address 172.16.1.2 255.255.255.0 no ip redirects ip nhrp map multicast 10.1.1.1 ip nhrp map 172.16.1.1 10.1.1.1 ip nhrp network-id 1 ip nhrp nhs 172.16.1.1 delay 1000 tunnel source Ethernet0/0 tunnel mode gre multipoint tunnel key 1endrouter eigrp 100 network 88.88.88.0 0.0.0.255 network 172.16.1.0 0.0.0.255router eigrp 101 network 88.88.88.0 0.0.0.255 network 172.16.2.0 0.0.0.255
Some outputs:
spoke#sh ip eigrp topology 99.99.99.0/24EIGRP-IPv4 Topology Entry for AS(100)/ID(172.16.2.2) for 99.99.99.0/24 State is Passive, Query origin flag is 1, 1 Successor(s), FD is 25881600 Descriptor Blocks: 172.16.1.1 (Tunnel1), from 172.16.1.1, Send flag is 0x0 Composite metric is (25881600/281600), route is Internal Vector metric: Minimum bandwidth is 100 Kbit Total delay is 11000 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1472 Hop count is 1 Originating router is 172.16.2.1EIGRP-IPv4 Topology Entry for AS(101)/ID(172.16.2.2) for 99.99.99.0/24 State is Passive, Query origin flag is 1, 0 Successor(s), FD is 4294967295 Descriptor Blocks: 172.16.2.1 (Tunnel2), from 172.16.2.1, Send flag is 0x0 Composite metric is (26137600/281600), route is Internal Vector metric: Minimum bandwidth is 100 Kbit Total delay is 21000 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1472 Hop count is 1 Originating router is 172.16.2.1spoke#sh ip nhrp detail
172.16.1.1/32 via 172.16.1.1
Tunnel1 created 00:16:33, never expire
Type: static, Flags: used
NBMA address: 10.1.1.1
172.16.2.1/32 via 172.16.2.1
Tunnel2 created 00:16:33, never expire
Type: static, Flags: used
NBMA address: 10.2.2.1
spoke#
and
hub#sh ip eigrp topology 88.88.88.0/24EIGRP-IPv4 Topology Entry for AS(100)/ID(172.16.2.1) for 88.88.88.0/24 State is Passive, Query origin flag is 1, 1 Successor(s), FD is 25881600 Descriptor Blocks: 172.16.1.2 (Tunnel1), from 172.16.1.2, Send flag is 0x0 Composite metric is (25881600/281600), route is Internal Vector metric: Minimum bandwidth is 100 Kbit Total delay is 11000 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1472 Hop count is 1 Originating router is 172.16.2.2EIGRP-IPv4 Topology Entry for AS(101)/ID(172.16.2.1) for 88.88.88.0/24 State is Passive, Query origin flag is 1, 0 Successor(s), FD is 4294967295 Descriptor Blocks: 172.16.2.2 (Tunnel2), from 172.16.2.2, Send flag is 0x0 Composite metric is (26137600/281600), route is Internal Vector metric: Minimum bandwidth is 100 Kbit Total delay is 21000 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1472 Hop count is 1 Originating router is 172.16.2.2hub#show ip nhrp detail
172.16.1.2/32 via 172.16.1.2
Tunnel1 created 00:16:09, expire 01:43:50
Type: dynamic, Flags: unique registered
NBMA address: 10.3.3.1
172.16.2.2/32 via 172.16.2.2
Tunnel2 created 00:16:09, expire 01:43:50
Type: dynamic, Flags: unique registered
NBMA address: 10.3.3.1 -
We just commission an STM1 link to an upstream ISP, part of the bandwidth is meant for mobile data service of a customer. The customers complain of slow download while we still have 100Mbps of capacity available. The customer did an FTP test but the result was not satisfactorily. Can any one recommend the best practice of testing this kind of connection and any possible suggestions are highly welcome on how to improve the link. The connection to upstream ISP is a BGP connection (traceroute, ping,Video streaming, etc seems to be okay).
HI, [Pls RATE if HELPS]
Download & Use the "WAN KILLER" Tool to generate the Traffic on the LInk.
You can load the LINK with "Traffic" and check for the Capability, Burst & failure rates.
Hope I am Informative.
Pls RATE if HELPS
Best Regards,
Guru Prasad R -
DUAL ISPs and Locad Balancing with BM 3.9
I am running a Border Manager 3.9 server and we use a Dual WAN router to bring in our (2) ISPs from different vendors into (1) netcard on the server. The Dual WAN router does load balancing fine but I was wondering if there is a better more efficient way?
Would Border Manager allow multiple Public 10/100/1000 Netcards and do load balancing and fail over?
We run fine speedwise for our little company but it just seems wastefull to have (2) T1's coming into a 10/100 Dual WAN router.
Just wondering,
[email protected]In article <[email protected]>, Rlmillies wrote:
> I am running a Border Manager 3.9 server and we use a Dual WAN router to
> bring in our (2) ISPs from different vendors into (1) netcard on the
> server. The Dual WAN router does load balancing fine but I was
> wondering if there is a better more efficient way?
No, that's basically the best way. I've got a number of clients set up to
do that, some of them with BMgr clusters behind the twin-wan routers. One
of them at one point even had 5 WAN links (using Xincom X16).
>
> Would Border Manager allow multiple Public 10/100/1000 Netcards and do
> load balancing and fail over?
No. NetWare wasn't designed to do that with IP, though it could with IPX.
>
> We run fine speedwise for our little company but it just seems
> wastefull to have (2) T1's coming into a 10/100 Dual WAN router.
It generally is. What I usually have are clients with a T1 (fixed IP
addresses, mostly for email), and a cable modem/dsl connection (usually
DHCP). I set up load balancing to bias most of the outbound load onto
the cable modem (usually 5mps or greater), and there is usually a very
noticeable increase in browsing speed for the users.
Craig Johnson
Novell Knowledge Partner
*** For a current patch list, tips, handy files and books on
BorderManager, go to http://www.craigjconsulting.com *** -
Dual ISP on ASA VPN question.
Hi all.
My question is very simple is there any way or feature that could allow us to have a backup VPN tunnel on at the secondary ISP at the asa 5520?
Lets assume if the primary isp goes down is there any way for the VPN tunnel come online at the backup isp ?
Config:
crypto isakmp enable outside
crypto isakmp enable backup
tunnel-group 200.200.2.1 type ipsec-l2l
tunnel-group 200.200.2.1 ipsec-attributes
pre-shared-key CISCO
tunnel-group 200.200.1.1 type ipsec-l2l
tunnel-group 200.200.1.1 ipsec-attributes
pre-shared-key CISCO
crypto ipsec transform-set 3DES_MD5 esp-3des esp-md5-hmac
crypto map VPN 10 match address VLAN121_TO_VLAN23
crypto map VPN 10 set peer 200.200.1.1
crypto map VPN 10 set transform-set 3DES_MD5
crypto map VPN 20 match address VLAN121_TO_VLAN23
crypto map VPN 20 set peer 200.200.2.1
crypto map VPN 20 set transform-set 3DES_MD5
! Apply crypto-map and enable VPN traffic to bypass ACLs
crypto map VPN interface outside
crypto map VPN interface backup
sysopt connection permit-vpn
Thank you.We are not abble to make a loop back on the ASA.
The routing with SLA is working fine the problem is when local network goes to remote network always try to get at the first tunnel with was setup for first isp ip adddrs. -
Cisco ASA 5505 Dual-ISP Backup VPN
I am trying to create a backup tunnel from an ASA 5505 to a pix 501 in the case of the Main ISP failing. The Pix external side will stay the same, but not quite sure how I can create a new crypto map and have it use the Backup ISP interface without bringing down the main tunnel.
My first thought was to add the following crypto map to the configuration below:
crypto map outside_map 2 match address outside_1_cryptomap
crypto map outside_map 2 set peer 9.3.21.13
crypto map outside_map 2 set transform-set ESP-DES-MD5
crypto map outside_map interface backupisp -->but this would break the current tunnel.
NYASA# sh run
: Saved
ASA Version 7.2(4)
hostname NYASA
domain-name girls.org
enable password CHwdJ2WMUcjxIIm8 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
interface Vlan1
nameif inside
security-level 100
ip address 10.1.2.1 255.255.255.0
interface Vlan2
nameif outside
security-level 0
ip address 9.17.5.8 255.255.255.240
interface Vlan3
description Backup ISP
nameif backupisp
security-level 0
ip address 6.27.9.5 255.255.255.0
interface Ethernet0/0
switchport access vlan 2
interface Ethernet0/1
interface Ethernet0/2
switchport access vlan 3
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
ftp mode passive
dns server-group DefaultDNS
access-list outside_access_in extended permit icmp any any echo-reply
access-list outside_access_in extended permit icmp any any source-quench
access-list outside_access_in extended permit icmp any any unreachable
access-list outside_access_in extended permit icmp any any time-exceeded
access-list outside_access_in extended permit icmp any any
access-list inside_nat0_outbound extended permit ip 10.1.2.0 255.255.255.0 10.1.1.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 10.1.2.0 255.255.255.0 10.1.100.0 255.255.255.0
access-list outside_1_cryptomap extended permit ip 10.1.2.0 255.255.255.0 10.1.1.0 255.255.255.0
access-list outside_1_cryptomap extended permit ip 10.1.2.0 255.255.255.0 10.1.100.0 255.255.255.0
access-list 150 extended permit ip any host 10.1.2.27
access-list 150 extended permit ip host 10.1.2.27 any
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu backupisp 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
nat-control
global (outside) 1 interface
global (backupisp) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 9.17.5.7 1 track 1
route backupisp 0.0.0.0 0.0.0.0 6.27.9.1 254
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
aaa authentication ssh console LOCAL
http server enable
http 10.1.2.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
sla monitor 10
type echo protocol ipIcmpEcho 4.2.2.2 interface outside
num-packets 3
timeout 1000
frequency 3
sla monitor schedule 10 life forever start-time now
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set peer 9.3.21.13
crypto map outside_map 1 set transform-set ESP-DES-MD5
crypto map outside_map interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption des
hash md5
group 2
lifetime 86400
crypto isakmp nat-traversal 20
track 1 rtr 10 reachability
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 60
console timeout 0
management-access inside
username ptiadmin password BtOLil2gR0VaUjfX encrypted privilege 15
tunnel-group 9.4.21.13 type ipsec-l2l
tunnel-group 9.4.21.13 ipsec-attributes
pre-shared-key *
prompt hostname context
Cryptochecksum:22bb60b07c4c1805b89eb2376683f861
: end
NYASA#
Thanks in advance.In that case is the PIX who needs two peers (to the ASA).
The ASA will requiere the crypto map to be applied to the backup interface as well (as you mentioned)
crypto map outside_map interface backupisp -->but this would break the current tunnel.
The above command should not break the current tunnel (if the route to reach the other end goes out via the primary interface).
Additionally you need IP SLA configured in the ASA to allow it to use the primary connection and fallback to the backup connection to build-up the tunnel (as well to use again the primary interface when it recovers).
Federico. -
Dual ISP load balancing with 2 routers and 2 FW without using BGP
Hi all,
Based on the attachment diagram, is the design viable?
Do anyone has a similar deployment before and can you share with me the config guide to this because I'm at lost on a few configs:
1. On core switch A and B, I understood we need to have a default route pointing to the firewall interface. For this case, I have different IPs for the same context on both the firewalls.
So, how should the config be?
CoreSW_A(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.110
CoreSW_A(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.111
I don't think the above will work as the core switch will load balance the traffic to both firewalls even if one of the context is on standby mode?
2. The area from the firewall to the internet would all be public IP. Thus, if i put a switch in between the firewall and the router, then i would waste some public IP addresses but if i remove the switch, I would not have enough ports on the ASA firewall. What is the best recommended solution for this?
3. How do I load balance traffic to both R1 and R2 to their respective ISPs without using BGP? I may be using only a 2811 router.
Thanks alot!!.. really much looking forward for some guidance and tips on this as I havent found any guides on this deployment yet.. mostly are LAN HA.For policy based routing, I would need to create route maps on the core switch itself right?
Correct me if I'm wrong, if i use route-maps, i would be assigning e.g. internal network A to go through firewall context A and internal network B to go through firewall context B.
Context A will only have path to Router A and context B will only have path to Router B. But if router B goes down, network B won't be able to access the Internet, right?
I'm not sure whether it's a PI or PA for this as the ISP will assign us a block of IP address, for example 202.111.1.8/29 (these IPs can be used for webservers, etc). There will also be a public IP of /30 on the serial interface to connect to their router.
Thanks alot.. -
Dual ISP connection unequal load balancing
Hi All,
I an issue regarding load balancing between to ISP. I have done policy based routing as stated in other cisco discussions .
I have 2 /30 as my test ISP and isp ip configured on other switch while i have my customer configs on my end. I can ping the two test ISP from my router but not with PC's in the lan until i remove "ip nat inside source route-map 20 interface GigabitEthernet0/0.20 overload" from the routers config.
.. Please help
Load-Balancing-Router#show run
Building configuration...
Current configuration : 2716 bytes
! Last configuration change at 04:09:37 UTC Tue Apr 21 2015 by anprasad
version 15.0
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname Load-Balancing-Router
boot-start-marker
boot-end-marker
no aaa new-model
no ipv6 cef
ip source-route
ip cef
ip dhcp excluded-address 192.168.1.2
ip dhcp excluded-address 192.168.1.0 192.168.1.100
ip dhcp pool LAN
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
ip domain name fnu.ac.fj
multilink bundle-name authenticated
license udi pid CISCO1921/K9 sn FGL150925YE
username anprasad privilege 15 secret 5 $1$Oy40$h13lWAN4upzI19L6/MXjf/
username aaa privilege 15 secret 5 $1$W3JH$LMd0LUtdxJlXXJkB.NxjB0
ip ssh version 1
class-map match-all 512K-Outbound
match access-group name DR-512K-OutBound
class-map match-all 10240K-Outbound
match access-group name DR-1024K-OutBound
policy-map DR-Outbound
class 10240K-Outbound
police rate 10240000 bps burst 1920000 bytes
conform-action transmit
exceed-action drop
class 512K-Outbound
police rate 512000 bps burst 96000 bytes
conform-action transmit
exceed-action drop
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
interface GigabitEthernet0/0.10
description Student-Internet
encapsulation dot1Q 10
ip address 202.0.1.1 255.255.255.252
ip nat outside
ip virtual-reassembly
interface GigabitEthernet0/0.20
description Staff-Internet
encapsulation dot1Q 20
ip address 202.0.2.1 255.255.255.252
ip nat outside
ip virtual-reassembly
shutdown
interface GigabitEthernet0/1
description LAN-Network
ip address 192.168.1.1 255.255.255.0
ip nat inside
ip virtual-reassembly
duplex auto
speed auto
interface FastEthernet0/0/0
no ip address
shutdown
duplex auto
speed auto
ip forward-protocol nd
no ip http server
no ip http secure-server
ip nat inside source route-map 10 interface GigabitEthernet0/0.10 overload
ip nat inside source route-map 20 interface GigabitEthernet0/0.20 overload
ip route 0.0.0.0 0.0.0.0 202.0.1.2
ip route 0.0.0.0 0.0.0.0 202.0.2.2
ip access-list extended DR-10240K-OutBound
permit ip 192.168.1.0 0.0.0.255 any
ip access-list extended DR-512K-OutBound
permit ip 192.168.1.0 0.0.0.255 any
access-list 100 permit ip 192.168.1.0 0.0.0.255 any
route-map 10 permit 10
match ip address 100
match interface GigabitEthernet0/0.10
route-map 20 permit 20
match ip address 100
match interface GigabitEthernet0/0.20
snmp-server community fnuro RO
control-plane
line con 0
logging synchronous
login local
line aux 0
line vty 0 4
login local
scheduler allocate 20000 1000
endHi,
I would like to ask if you are done with your configuration? Is it working?
next month we will add an addition ISP and I will try to configure it?
Hope you'll give me some ideas.
thank you -
Hello All,
I am trying to build a DMVPN solution for two sites each with secondary ISPs.
The solution works "sort of", but doesn't seem very robust (sometimes a router reload is required if VPN doesn't come up after ISP failover)
I was wondering if anyone had any suggestions to my config below?
Thanks!
!!!!HUB!!!!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname Router!boot-start-markerboot-end-marker!no logging console!no aaa new-modelmemory-size iomem 5!!ip cef!!crypto isakmp policy 3 hash md5 authentication pre-sharecrypto isakmp key cisco123 address 0.0.0.0 0.0.0.0!!crypto ipsec transform-set strong esp-3des esp-md5-hmac!crypto ipsec profile dmvpn set security-association lifetime seconds 1800 set transform-set aes256 set pfs group5!crypto ipsec profile dmvpn2 set security-association lifetime seconds 1800 set transform-set aes256 set pfs group5!!interface Tunnel0 ip address 10.255.255.1 255.255.255.0 no ip redirects ip mtu 1400 no ip next-hop-self eigrp 53 no ip split-horizon eigrp 53 ip nhrp authentication secret1 ip nhrp map multicast dynamic ip nhrp network-id 6 ip nhrp holdtime 300 ip tcp adjust-mss 1360 delay 1000 tunnel source GigabitEthernet0/1 tunnel mode gre multipoint tunnel key 545 tunnel protection ipsec profile dmvpn shared!interface Tunnel1 ip address 10.255.254.1 255.255.255.0 no ip redirects ip mtu 1400 no ip next-hop-self eigrp 53 no ip split-horizon eigrp 53 ip nhrp authentication secret1 ip nhrp map multicast dynamic ip nhrp network-id 7 ip nhrp holdtime 300 ip tcp adjust-mss 1360 delay 1000 tunnel source FastEthernet0/0/0 tunnel mode gre multipoint tunnel key 546 tunnel protection ipsec profile dmvpn2 shared!interface Tunnel2 ip address 10.255.253.1 255.255.255.0 no ip redirects ip mtu 1400 no ip next-hop-self eigrp 53 no ip split-horizon eigrp 53 ip nhrp authentication secret1 ip nhrp map multicast dynamic ip nhrp network-id 8 ip nhrp holdtime 300 ip tcp adjust-mss 1360 delay 1000 tunnel source GigabitEthernet0/1 tunnel mode gre multipoint tunnel key 547 tunnel protection ipsec profile dmvpn shared!interface Tunnel3 ip address 10.255.252.1 255.255.255.0 no ip redirects ip mtu 1400 no ip next-hop-self eigrp 53 no ip split-horizon eigrp 53 ip nhrp authentication secret1 ip nhrp map multicast dynamic ip nhrp network-id 9 ip nhrp holdtime 300 ip tcp adjust-mss 1360 delay 1000 tunnel source FastEthernet0/0/0 tunnel mode gre multipoint tunnel key 548 tunnel protection ipsec profile dmvpn2 shared!interface FastEthernet0/0/0 description Secondary ISP ip address 199.1.1.1 255.255.255.0 duplex auto speed auto!interface VLAN1 description LAN ip address 192.168.1.1 255.255.255.0!interface GigabitEthernet0/1 description Primary ISP ip address 200.1.1.1 255.255.255.0 duplex auto speed auto!router eigrp 53 network 10.255.252.0 0.0.0.255 network 10.255.253.0 0.0.0.255 network 10.255.254.0 0.0.0.255 network 10.255.255.0 0.0.0.255 network 192.168.1.0 eigrp stub connected no auto-summary!!ip route 0.0.0.0 0.0.0.0 199.1.1.2 5ip route 0.0.0.0 0.0.0.0 200.1.1.2 !!control-plane!line con 0line aux 0line vty 0 4 login!!end
!!!SPOKE!!!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname Router!boot-start-markerboot-end-marker!no logging console!no aaa new-modelmemory-size iomem 5!!ip cef!!crypto isakmp policy 3 hash md5 authentication pre-sharecrypto isakmp key cisco123 address 0.0.0.0 0.0.0.0!!crypto ipsec transform-set strong esp-3des esp-md5-hmac!crypto ipsec profile dmvpn set security-association lifetime seconds 1800 set transform-set aes256 set pfs group5!crypto ipsec profile dmvpn2 set security-association lifetime seconds 1800 set transform-set aes256 set pfs group5!!!interface VLAN1 ip address 192.168.0.1 255.255.255.0 no ip redirects!interface Tunnel0 ip address 10.255.255.5 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication secret1 ip nhrp map 10.255.255.1 200.1.1.1 ip nhrp map multicast 200.1.1.1 ip nhrp network-id 6 ip nhrp holdtime 300 ip nhrp nhs 10.255.255.1 ip nhrp registration timeout 30 delay 1000 tunnel source GigabitEthernet0/1 tunnel mode gre multipoint tunnel key 545 tunnel protection ipsec profile dmvpn shared!interface Tunnel1 ip address 10.255.254.5 255.255.255.0 no ip redirects ip mtu 1440 ip nhrp authentication secret1 ip nhrp map 10.255.254.1 199.1.1.1 ip nhrp map multicast 199.1.1.1 ip nhrp network-id 7 ip nhrp holdtime 300 ip nhrp nhs 10.255.254.1 delay 1500 tunnel source GigabitEthernet0/1 tunnel mode gre multipoint tunnel key 546 tunnel protection ipsec profile dmvpn shared!interface Tunnel2 ip address 10.255.253.5 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication secret1 ip nhrp map multicast 200.1.1.1 ip nhrp map 10.255.253.1 200.1.1.1 ip nhrp network-id 8 ip nhrp holdtime 300 ip nhrp nhs 10.255.253.1 ip nhrp registration timeout 30 delay 1000 tunnel source FastEthernet0/0/0 tunnel mode gre multipoint tunnel key 547 tunnel protection ipsec profile dmvpn2 shared!interface Tunnel3 ip address 10.255.252.5 255.255.255.0 no ip redirects ip mtu 1440 ip nhrp authentication secret1 ip nhrp map multicast 199.1.1.1 ip nhrp map 10.255.252.1 199.1.1.1 ip nhrp network-id 9 ip nhrp holdtime 300 ip nhrp nhs 10.255.252.1 delay 1500 tunnel source FastEthernet0/0/0 tunnel mode gre multipoint tunnel key 548 tunnel protection ipsec profile dmvpn2 shared!interface FastEthernet0/0/0description Secondary Internet ip address 201.1.1.1 255.255.255.0 duplex auto speed auto!interface GigabitEthernet0/1 description Primary Internet ip address 201.2.2.1 255.255.255.0 duplex auto speed auto!router eigrp 53 distribute-list 1 out network 10.255.252.0 0.0.0.255 network 10.255.253.0 0.0.0.255 network 10.255.254.0 0.0.0.255 network 10.255.255.0 0.0.0.255 network 192.168.0.0 offset-list 1 out 12800 Tunnel1 eigrp stub connected no auto-summary!!ip route 0.0.0.0 0.0.0.0 201.2.2.2ip route 0.0.0.0 0.0.0.0 201.1.1.2 5!!access-list 1 permit 192.168.0.0access-list 1 permit 10.255.255.0 0.0.0.255access-list 1 permit 10.255.254.0 0.0.0.255access-list 1 permit 10.255.253.0 0.0.0.255access-list 1 permit 10.255.252.0 0.0.0.255!!control-plane!!line con 0line aux 0line vty 0 4 login!!endHello,
Thanks for the response!
I left the stub on the hub while troubleshooting, it has since been removed.
By DPD, do you mean "crypto isakmp keepalive 10 periodic"?
I've since added that (spoke and hub) and while the tunnels work great (they fail over, can ping 10.255.25x.x) the routes do not update which lead me to believe it's an EIGRP problem. Is there something else I should do for DPD?
Thanks again
Will
Can't edit the original post, so:
!Hub
crypto isakmp keepalive 10 periodic
router eigrp 53
network 10.255.252.0 0.0.0.255
network 10.255.253.0 0.0.0.255
network 10.255.254.0 0.0.0.255
network 10.255.255.0 0.0.0.255
network 192.168.1.0
no auto-summary
!Spoke
crypto isakmp keepalive 10 periodic
router eigrp 53
network 10.255.252.0 0.0.0.255
network 10.255.253.0 0.0.0.255
network 10.255.254.0 0.0.0.255
network 10.255.255.0 0.0.0.255
network 192.168.0.0
eigrp stub connected
no auto-summary -
Configuring PFR with NAT - Dual ISP
Hi,
We are configuring the pfr feature in a router, this router has two connections to Internet, different providers. I have the following question:
Is possible to configure two pool for NAT translations? one pool by each internet provider?
I attach the diagram.Thanks Julio.
I have a second question.
I was able publish an internal server with the PFR function activated with two different ISP and using static nat for incoming connections without problem, however when I try to publish a IPSEC VPN server I can not publish the ESP protocol with two different public addresses. The IOS only permit the publication of the ESP protocol using only one public address. How I can publish the ESP protocol using two public addresses at the same time (ISPA-ISPB)?
Regards. -
Ipsec tunnel possible with Checkpoint ngx 6.5 and Cisco ISR-dual ISP?
Hi Gurus,
I have a requirement to fulfill in that there are 2 sites that I need to create an ipsec tunnel. A remote site running a Checkpoint ngx 6.5 and a local site with 2 different ISPs and 2 x ISR 29xx routers for both ISP and hardware redundancy. I have only done the vpn setup with one ISR and ISP1 so far.
I am planning to have just 1 ISR (ISR1) and ISP1 being active at any given time. If ISP1 or ISR 1 goes out, all traffic should fail over to ISR2 with ISP2.
is this possible with the ISRs?
Checkpoint does not appear to allow seeing the different ISRs with 2 possible WAN ip addresses with the same encryption domain or 'interesting traffic', so i am not sure if this work at all.
BGP won't be used.
I have looked at ip sla, pbr, and it appears that the best I could achieve would be vpn traffic via ISR1 and ISP1, and could failover only the non vpn traffic to ISR2 and ISP2. Please correct me if I am wrong....many thanks.
Any ideas will be greatly appreciated..
CivicfanI found the problem but dont know how to fix it now!
Problem is on siteB with using the same ACL name "siteA" in both sequence numbers in cryptomap "outside_map"
crypto map outside_map 9 match address SiteA
crypto map outside_map 9 set peer 212.89.229.xx
crypto map outside_map 9 set transform-set ESP-AES-256-SHA
crypto map outside_map 9 set security-association lifetime seconds 28800
crypto map outside_map 9 set security-association lifetime kilobytes 4608000
crypto map outside_map 10 match address SiteA
crypto map outside_map 10 set peer 212.89.235.yy
crypto map outside_map 10 set transform-set ESP-AES-256-SHA
crypto map outside_map 10 set security-association lifetime seconds 28800
crypto map outside_map 10 set security-association lifetime kilobytes 4608000
If I remove:
no crypto map outside_map 9 match address SiteA
the IPSEC through 2nd ISP on siteA is working correct -
Hi expert,
I am facing a eigrp routing issues , Has anyone kindly assist...
The topology as below, each router only has two tunnels and run in same eigrp AS
Here is my question in red with underline :
R2: sh ip ro
D 192.168.30.0/24 [90/310172416] via 192.168.1.1, 01:08:05, Tunnel1
[90/310172416] via 192.168.0.3, 01:08:05, Tunnel0
R3: sh ip ro
D 192.168.20.0/24 [90/310172416] via 192.168.1.1, 01:12:25, Tunnel1
[90/310172416] via 192.168.0.2, 01:12:25, Tunnel0
The result see above is not my expect , as i understand :
at R2 192.168.30.0 learn from Tunnel1 should be via192.168.1.3 not red one
at R3 192.168.20.0 learn from Tunnel1 should be via 192.168.1.2 not red one
because of via 192.168.1.1 , that's mean the traffic must through R1 (spoke to HUB) not Spoke to Spoke , am i right ?
I hope the route between R2 and R3 can always use spoke to spoke tunnel
I also checked nhrp and ipsec status , anything looks work properly except the eigrp route i mention above.
Here is configuration:
R1:
interface Loopback0
ip address 192.168.10.254 255.255.255.0
interface Tunnel0
ip address 192.168.0.1 255.255.255.0
no ip redirects
ip accounting output-packets
ip hold-time eigrp 1 35
no ip next-hop-self eigrp 1
ip nhrp authentication cisco123
ip nhrp map multicast dynamic
ip nhrp network-id 1
ip nhrp holdtime 10
ip nhrp cache non-authoritative
no ip split-horizon eigrp 1
tunnel source 172.16.15.2
tunnel mode gre multipoint
tunnel protection ipsec profile DMVPN
interface Tunnel1
ip address 192.168.1.1 255.255.255.0
no ip redirects
ip accounting output-packets
no ip next-hop-self eigrp 1
ip nhrp authentication cisco123
ip nhrp map multicast dynamic
ip nhrp network-id 2
ip nhrp holdtime 10
ip nhrp cache non-authoritative
no ip split-horizon eigrp 1
tunnel source 172.17.15.2
tunnel mode gre multipoint
tunnel protection ipsec profile DMVPN
router eigrp 1
network 192.168.0.0
network 192.168.1.0
network 192.168.10.0
no auto-summary
R2:
interface Tunnel0
ip address 192.168.0.2 255.255.255.0
no ip redirects
ip hold-time eigrp 1 35
no ip next-hop-self eigrp 1
ip nhrp authentication cisco123
ip nhrp map 192.168.0.1 172.16.15.2
ip nhrp map multicast 172.16.15.2
ip nhrp network-id 1
ip nhrp holdtime 10
ip nhrp nhs 192.168.0.1
ip nhrp cache non-authoritative
no ip split-horizon eigrp 1
tunnel source 172.16.25.2
tunnel mode gre multipoint
tunnel protection ipsec profile DMVPN
interface Tunnel1
ip address 192.168.1.2 255.255.255.0
no ip redirects
no ip next-hop-self eigrp 1
ip nhrp authentication cisco123
ip nhrp map 192.168.1.1 172.17.15.2
ip nhrp map multicast 172.17.15.2
ip nhrp network-id 2
ip nhrp holdtime 10
ip nhrp nhs 192.168.1.1
ip nhrp cache non-authoritative
no ip split-horizon eigrp 1
tunnel source 172.17.25.2
tunnel mode gre multipoint
tunnel protection ipsec profile DMVPN
router eigrp 1
network 192.168.0.0
network 192.168.1.0
network 192.168.20.0
no auto-summary
R3
interface Loopback0
ip address 192.168.30.254 255.255.255.0
interface Tunnel0
ip address 192.168.0.3 255.255.255.0
no ip redirects
ip hold-time eigrp 1 35
no ip next-hop-self eigrp 1
ip nhrp authentication cisco123
ip nhrp map 192.168.0.1 172.16.15.2
ip nhrp map multicast 172.16.15.2
ip nhrp network-id 1
ip nhrp holdtime 10
ip nhrp nhs 192.168.0.1
ip nhrp cache non-authoritative
no ip split-horizon eigrp 1
tunnel source 172.16.35.2
tunnel mode gre multipoint
tunnel protection ipsec profile DMVPN
interface Tunnel1
ip address 192.168.1.3 255.255.255.0
no ip redirects
no ip next-hop-self eigrp 1
ip nhrp authentication cisco123
ip nhrp map 192.168.1.1 172.17.15.2
ip nhrp map multicast 172.17.15.2
ip nhrp network-id 2
ip nhrp holdtime 10
ip nhrp nhs 192.168.1.1
ip nhrp cache non-authoritative
no ip split-horizon eigrp 1
tunnel source 172.17.35.2
tunnel mode gre multipoint
tunnel protection ipsec profile DMVPN
router eigrp 1
network 192.168.0.0
network 192.168.1.0
network 192.168.30.0Hi AllertGen ,
Each each router's tunnel0 and tunnel1 are work well , they all can ping each other ip as well via tunnel 0 and tunnel 1 (192.168.0.0/24 & 192.168.1.0/24)
and also at each router has two physical interface connect to different ISP.
In this topology ,my purpose is when spoke to spoke , they will has two routes via two NHRP cloulds , i keep the same eigrp priority at each router just for equal cost load sharing ,the more important thing is the next hop IP.
Actually , The ipsec function is not my concern so far, i just try your suggestion add the "shared" at the end of the line , its still has same result , but as i understand , if there is any wrong with ipsec profile, the tunnel won't work well , am i right ?
Thanks for your kind assist
Here is some show result at each router , hope that's helpful.
R1
R1#sh ip int bri
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 172.16.15.2 YES NVRAM up up
FastEthernet0/1 172.17.15.2 YES NVRAM up up
Loopback0 192.168.10.254 YES NVRAM up up
Tunnel0 192.168.0.1 YES NVRAM up up
Tunnel1 192.168.1.1 YES NVRAM up up
R1#sh dmvpn
Tunnel0, Type:Hub, NHRP Peers:2,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
1 172.16.25.2 192.168.0.2 UP never D
1 172.16.35.2 192.168.0.3 UP never D
Tunnel1, Type:Hub, NHRP Peers:2,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
1 172.17.25.2 192.168.1.2 UP never D
1 172.17.35.2 192.168.1.3 UP never D
R1#sh ip eigrp top
P 192.168.10.0/24, 1 successors, FD is 128256
via Connected, Loopback0
P 192.168.0.0/24, 1 successors, FD is 297244416
via Connected, Tunnel0
P 192.168.1.0/24, 1 successors, FD is 297244416
via Connected, Tunnel1
P 192.168.30.0/24, 2 successors, FD is 297372416
via 192.168.0.3 (297372416/128256), Tunnel0
via 192.168.1.3 (297372416/128256), Tunnel1
P 192.168.20.0/24, 2 successors, FD is 297372416
via 192.168.0.2 (297372416/128256), Tunnel0
via 192.168.1.2 (297372416/128256), Tunnel1
R1#sh ip nhrp
192.168.0.2/32 via 192.168.0.2, Tunnel0 created 20:53:39, expire 00:00:07
Type: dynamic, Flags: unique nat registered used
NBMA address: 172.16.25.2
192.168.0.3/32 via 192.168.0.3, Tunnel0 created 20:53:38, expire 00:00:08
Type: dynamic, Flags: unique nat registered used
NBMA address: 172.16.35.2
192.168.1.2/32 via 192.168.1.2, Tunnel1 created 4d17h, expire 00:00:07
Type: dynamic, Flags: unique nat registered used
NBMA address: 172.17.25.2
192.168.1.3/32 via 192.168.1.3, Tunnel1 created 4d17h, expire 00:00:08
Type: dynamic, Flags: unique nat registered used
NBMA address: 172.17.35.2
R2
R2#sh ip int bri
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 172.16.25.2 YES NVRAM up up
FastEthernet0/1 172.17.25.2 YES NVRAM up up
Loopback0 192.168.20.254 YES NVRAM up up
Tunnel0 192.168.0.2 YES NVRAM up up
Tunnel1 192.168.1.2 YES NVRAM up up
R2#sh dmvpn
Tunnel0, Type:Spoke, NHRP Peers:2,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
1 172.16.15.2 192.168.0.1 UP 4d17h S
1 172.16.35.2 192.168.0.3 UP never D
Tunnel1, Type:Spoke, NHRP Peers:2,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
1 172.17.15.2 192.168.1.1 UP 4d17h S
1 172.17.35.2 192.168.1.3 UP never D
R2#sh ip eigrp topology
P 192.168.10.0/24, 2 successors, FD is 297372416
via 192.168.0.1 (297372416/128256), Tunnel0
via 192.168.1.1 (297372416/128256), Tunnel1
P 192.168.0.0/24, 1 successors, FD is 297244416
via Connected, Tunnel0
P 192.168.1.0/24, 1 successors, FD is 297244416
via Connected, Tunnel1
P 192.168.30.0/24, 2 successors, FD is 310172416
192.168.0.3 via 192.168.0.1 (310172416/297372416), Tunnel0
via 192.168.1.1 (310172416/297372416), Tunnel1
P 192.168.20.0/24, 1 successors, FD is 128256
via Connected, Loopback0
R2#sh ip nhrp
192.168.0.1/32 via 192.168.0.1, Tunnel0 created 4d20h, never expire
Type: static, Flags: nat used
NBMA address: 172.16.15.2
192.168.0.3/32 via 192.168.0.3, Tunnel0 created 00:00:14, expire 00:00:51
Type: dynamic, Flags: router nat
NBMA address: 172.16.35.2
192.168.1.1/32 via 192.168.1.1, Tunnel1 created 4d20h, never expire
Type: static, Flags: nat used
NBMA address: 172.17.15.2
192.168.1.3/32 via 192.168.1.3, Tunnel1 created 00:00:12, expire 00:00:53
Type: dynamic, Flags: router nat
NBMA address: 172.17.35.2
R3
R3#sh ip int bri
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 172.16.35.2 YES NVRAM up up
FastEthernet0/1 172.17.35.2 YES NVRAM up up
Loopback0 192.168.30.254 YES NVRAM up up
Tunnel0 192.168.0.3 YES NVRAM up up
Tunnel1 192.168.1.3 YES NVRAM up up
R3#sh dmvpn
Tunnel0, Type:Spoke, NHRP Peers:2,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
1 172.16.15.2 192.168.0.1 UP 4d17h S
1 172.16.25.2 192.168.0.2 UP never D
Tunnel1, Type:Spoke, NHRP Peers:2,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
1 172.17.15.2 192.168.1.1 UP 4d17h S
1 172.17.25.2 192.168.1.2 UP never D
R3#sh ip eigrp topology
P 192.168.10.0/24, 2 successors, FD is 297372416
via 192.168.0.1 (297372416/128256), Tunnel0
via 192.168.1.1 (297372416/128256), Tunnel1
P 192.168.0.0/24, 1 successors, FD is 297244416
via Connected, Tunnel0
P 192.168.1.0/24, 1 successors, FD is 297244416
via Connected, Tunnel1
P 192.168.30.0/24, 1 successors, FD is 128256
via Connected, Loopback0
P 192.168.20.0/24, 2 successors, FD is 310172416
192.168.0.2 via 192.168.0.1 (310172416/297372416), Tunnel0
via 192.168.1.1 (310172416/297372416), Tunnel1
R3#sh ip nhrp
192.168.0.1/32 via 192.168.0.1, Tunnel0 created 4d17h, never expire
Type: static, Flags: nat used
NBMA address: 172.16.15.2
192.168.0.2/32 via 192.168.0.2, Tunnel0 created 00:00:43, expire 00:00:22
Type: dynamic, Flags: router nat
NBMA address: 172.16.25.2
192.168.1.1/32 via 192.168.1.1, Tunnel1 created 4d17h, never expire
Type: static, Flags: nat used
NBMA address: 172.17.15.2
192.168.1.2/32 via 192.168.1.2, Tunnel1 created 00:01:02, expire 00:00:48
Type: dynamic, Flags: router nat implicit used
NBMA address: 172.17.25.2 -
PBR using dual ISP and single LAN subnet
Hello,
I have 2 ISP connections on the Cisco router 29121 i.e. Leased Line and PPPoe and single LAN subnet
I want to use PBR.
I want to allow ip traffic destined for 1.1.1.1,2.2.2.2,3.3.3.3 ( Fictitious IP) to go through Lease Line
and all other traffic through PPPoe
Please help me to achieve this.
Thanks in advance.WoW Great Thanks cadet alain
It working as desired.
This is my current config. I just want you help for last thing
If leased line goes down, I want to direct the user to PPPoe
However, if PPPoe, the users should NOT BE directed to leased line
int gi0/0
description << Leased Line >>
ip address 100.100.100.101 255.255.255.252
ip nat outside
no shut
int gi0/2
description << LAN Subnet>>
ip address 10.1.50.1 ip nat inside
ip policy route-map lease
no shut
interface Dialer0
ip address negotiated
ip mtu 1492
ip nat outside
ip virtual-reassembly in max-reassemblies 512
encapsulation ppp
ip tcp adjust-mss 1452
dialer pool 1
dialer-group 1
ppp authentication pap chap callin
ppp chap hostname XXXXXXXXXXXXXXX
ppp chap password 0 9860
ppp pap sent-username XXXXXXXXXXXXXXX password 0 9860
no cdp enable
interface GigabitEthernet0/1
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
no shut
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
pppoe enable group global
pppoe-client dial-pool-number 1
access-list 100 permit ip 10.1.50.0 0.0.0.255
route-map lease permit 10
match ip address 100
match interface gi0/0
route-map pppoe permit 10
match ip address 100
match interface dialer 0
ip nat inside source route-map lease interface gi0/0 overload
ip nat inside source route-map pppe interface dialer 0 overload
access-list 101 permit ip 10.10.1.50.0 0.0.0.255 host 1.1.1.1
acess-list 101 permit ip 10.1.50.0 0.0.0.255 host 4.2.2.2
route-map PBR permit 10
match ip address 101
set ip next-hop 100.100.100.102
ip route 0.0.0.0 0.0.0.0 dialer0
ip route 0.0.0.0 0.0.0.0 100.100.100.102
Maybe you are looking for
-
is there anyway i can hook my zen micro up in the car so it plays through my speakers and radio deck? . i see they have a belkin zen thing, but is that just a holder for it for going in your cup holder? if i cant listen to my zen in the car im tossin
-
Hi All, I have service PO containing 3000 records. But now when i try to display in me23n it is giving dump, the dump is below; How this problem can be solved. Current Version is 4.7 (SAPKH47029). I also tried to search for SAP note but unable to get
-
File Content Conversion for ignoring the entire line
Hi, I'm getting a CSV file from that i want to skip some records based on some validation.. for example: I'm getting the following data : EmpNo EmpName EmpDept E101 ABC
-
Smartforms's Service Tax incorrect
Dear All, We have a Smartform, its a invoice. It has got 37 items, Base Total (=555,000.00) is correct, but Service Tax @ 12% is wrong which is dependent on Base Total. BUT again the "TOTAL VALUE(=622,932.00) = Base Total + Tax @ 12% + Education cess
-
Search function in member filter shows multiple entries by value
Dear all, when using the search function to specify a filter on specific members, we are facing the issue that in the result area, the result value for one member is displayed redundantly several times. The access mode is set to "values in masterdata