Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Connecting to Cisco ASA - Dual WAN

    Scheduled Pinned Locked Moved IPsec
    1 Posts 1 Posters 550 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      barnettd
      last edited by

      Hi,

      I am connecting a pfsense failover pair to a head end that uses a Cisco ASA running 9.x. The pfsense side has dual wans configured with a failover gateway group and carp vips. All seems to be working normally with that config.

      The Cisco ASA has a feature to use multiple peers when setting up an IPSEC tunnel. When enabled, it will go through the peers in order until it can connect. The feature works great when connecting to other ASAs, but not so much with the pfsense. I suspect this is due to the pfsense side still passing traffic even if a gateway is marked as down.

      Question:
      Can I create firewall rules that activate/deactivate based on the active gateway as determined by the gateway group?

      Also open to other options to resolve this.

      Thanks

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.