Configure Redundant or Backup WAN/ISP Link on Cisco ASA – GUI

edledge Cisco logo

Scenario:
Make: Cisco
Model
: ASA 5506-X, ASA 5506 W-X, ASA 5508-X, Cisco ASA 5500 Series
Mode: GUI [Graphical User Interface]
Version: ASA version 9.x or later, ASDM version 7.x or later
Description: In this article, we will discuss the stepwise method of how to configure Redundant or Backup ISP links on Cisco ASA Firewalls. Here Cisco ASA will use a static route tracking feature to enable the device to use redundant or backup Internet connections. Redundant or Backup Links can be configured via CLI method as well.

Introduction

It is always recommended to have redundant internet services to counter the situations in case one ISP goes down. Here we will discuss how to configure an ASA for two ISPs to work as an automatic failover in case the primary internet line goes down. The configuration that is described in this article cannot be used for load balancing or load sharing, as it is not supported on the Cisco ASA. We will use SSH or CLI and ASDM or GUI methods on ASA.

Configuration – GUI

Step1: Login
Log in to the ASA using username and password.

ASA ASDM Login

Knowledge_Check_Cisco_01

1 / 5

What are the two types of packet capture in Cisco ASA?

2 / 5

What is the default buffer size of Cisco ASA PCAP?

3 / 5

How many interfaces in Cisco ASA can have same route map?

4 / 5

Does Cisco ASA supports PPPoE link?

5 / 5

How many 10 Gig ports are available in Cisco 5508-X ASA?

Your score is

The average score is 0%

0%

Step2: WAN Interfaces
Configure both WAN links on two different interfaces of the ASA. You could name those two interfaces as “outside” and “backup“.

Cisco_ASA_WAN_Interfaces

Step3: Routing
Add static routing for the Primary Internet line [WAN]. Here in this case, “outside” interface is the primary WAN, and “backup” is the secondary WAN. Follow the steps as shown below in the image.

Cisco_ASA_Static_Route

Step4: Tracking
While adding a route for the primary WAN, add tracing, and follow the steps as shown below.

Cisco_ASA_IP_SLA_1

Step5: Monitoring Option
While adding static route and tracking, click “Monitoring Options” in the previous step and add monitoring details as per requirement.

Cisco_ASA_IP_SLA_2

Step6: Routing for Secondary WAN
Add the static route of secondary WAN and keep the matrix to a maximum (recommended is 254).

Cisco_ASA_Secondary_WAN_

Step7: Verify Configuration
Verify the configuration and ensure routing is added.

Cisco_ASA_Static_Route

Now when the primary internet will be down then the secondary internet will kicks-in to route the traffic. This can be verified by below mentioned step.

Step8: Confirm Routing
To check and confirm via which internet provider the routing is going out, follow the step shown below in the image.

Cisco_ASA_Static_Route_Monitoring

After the primary ISP fails, the route is removed and the backup route is installed. The DEFAULT route now points to 11.22.11.1 through the backup interface:

Cisco_ASA_Static_Route_Monitoring

As shown above, as soon the primary internet goes down the secondary internet kicks-in to route the traffic. This will help to minimize the downtime in the network.

Other important topics

SourceKnowledge Base, Internet, Cisco

EA00126

Leave a Reply

Your email address will not be published. Required fields are marked *