<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPsec Dual ISP Failover in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/ipsec-dual-isp-failover/m-p/6690812#M266</link>
    <description>&lt;P&gt;Hi all!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been working on IPsec dual ISP failover setup using 3 HP MSR routers. The setup looks like the one below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| -- Hub1 -- via ISP1-- \&lt;/P&gt;&lt;P&gt;LAN (192.168.10.x) -- | &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;gt;&amp;gt;&amp;gt; Spoke (10.10.20.x)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| -- Hub2 -- via ISP2-- /&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Hub1 has static, Hub2 and&amp;nbsp;Spoke has dynamic IP address (Hub2 will be static in the future actual implem, I just don't have another static line at the moment). Spoke connects via Hub1 but in case ISP1 goes down, it should failover to ISP2, and should go back to ISP1 again in case ISP1 goes up again (it's like preemption). Please note that I will be having several spokes in the future that's why failover between ISP1 and ISP2 is important.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was already able to up the two tunnels to the Hubs from the Spoke at the same time but the failover doesn't work as I intended it to be. If I down the ISP1, the traffic does not pass through ISP2 even if the tunnel to ISP2 is up. Please see configs below.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HUB1:&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike local-name Hub1&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;acl number 3001&lt;BR /&gt;description To_IPsec_Tunnel&lt;BR /&gt;rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;acl number 3005&lt;/P&gt;&lt;P&gt;description To_Internet&lt;BR /&gt;rule 0 deny ip destination 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike proposal 1&lt;BR /&gt;encryption-algorithm 3des-cbc&lt;BR /&gt;dh group2&lt;BR /&gt;sa duration 3600&lt;BR /&gt;#&lt;BR /&gt;ike peer spoke&lt;BR /&gt;exchange-mode aggressive&lt;BR /&gt;pre-shared-key xxx&lt;BR /&gt;id-type name&lt;BR /&gt;remote-name Spoke&lt;BR /&gt;nat traversal&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set tran1&lt;BR /&gt;encapsulation-mode tunnel&lt;BR /&gt;transform esp&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;esp encryption-algorithm 3des&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec policy vpn 20 isakmp&lt;BR /&gt;security acl 3001&lt;/P&gt;&lt;P&gt;ike-peer spoke&lt;BR /&gt;transform-set tran1&lt;BR /&gt;sa duration time-based 28800&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;nat outbound 3005&lt;BR /&gt;ip address ISP1&lt;BR /&gt;ipsec policy vpn&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ip route-static 0.0.0.0 0.0.0.0 ISP1&lt;BR /&gt;ip route-static 10.10.20.0 255.255.255.0 ISP1&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec policy vpn local-address LoopBack0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hub2:&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike local-name Hub2&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;acl number 3001&lt;BR /&gt;description To_IPsec_Tunnel&lt;BR /&gt;rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;acl number 3005&lt;/P&gt;&lt;P&gt;description To_Internet&lt;BR /&gt;rule 0 deny ip destination 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike proposal 1&lt;BR /&gt;encryption-algorithm 3des-cbc&lt;BR /&gt;dh group2&lt;BR /&gt;sa duration 3600&lt;BR /&gt;#&lt;BR /&gt;ike peer spoke2&lt;BR /&gt;exchange-mode aggressive&lt;BR /&gt;pre-shared-key xxx&lt;BR /&gt;id-type name&lt;BR /&gt;remote-name Spoke&lt;BR /&gt;nat traversal&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set tran1&lt;BR /&gt;encapsulation-mode tunnel&lt;BR /&gt;transform esp&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;esp encryption-algorithm 3des&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec policy vpn 20 isakmp&lt;BR /&gt;security acl 3001&lt;/P&gt;&lt;P&gt;ike-peer spoke2&lt;BR /&gt;transform-set tran1&lt;BR /&gt;sa duration time-based 28800&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;nat outbound 3005&lt;BR /&gt;ip address&amp;nbsp;dhcp-alloc&lt;BR /&gt;ipsec policy vpn&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ip route-static 0.0.0.0 0.0.0.0 ISP2&lt;BR /&gt;ip route-static 10.10.20.0 255.255.255.0 ISP2&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec policy vpn local-address LoopBack0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Spoke:&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike local-name Spoke&lt;BR /&gt;#&lt;BR /&gt;acl number 3001&lt;BR /&gt;description To_IPsec_Tunnel&lt;BR /&gt;rule 5 permit ip source 10.10.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255&lt;BR /&gt;acl number 3002&lt;BR /&gt;description To_IPSec_Tunnel&lt;BR /&gt;rule 5 permit ip source 10.10.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255&lt;BR /&gt;acl number 3005&lt;BR /&gt;description To_Internet&lt;BR /&gt;rule 3 deny ip destination 192.168.10.0 0.0.0.255&lt;BR /&gt;rule 5 permit ip source 10.10.20.0 0.0.0.255&lt;BR /&gt;#&lt;BR /&gt;ike proposal 1&lt;BR /&gt;encryption-algorithm 3des-cbc&lt;BR /&gt;dh group2&lt;BR /&gt;sa duration 3600&lt;BR /&gt;#&lt;BR /&gt;ike dpd deadpeer&lt;BR /&gt;#&lt;BR /&gt;ike peer spoke&lt;BR /&gt;exchange-mode aggressive&lt;BR /&gt;pre-shared-key xxx&lt;BR /&gt;id-type name&lt;BR /&gt;remote-name Hub1&lt;BR /&gt;remote-address ISP1&lt;BR /&gt;nat traversal&lt;BR /&gt;dpd deadpeer&lt;BR /&gt;#&lt;BR /&gt;ike peer spoke2&lt;BR /&gt;exchange-mode aggressive&lt;BR /&gt;pre-shared-key xxx&lt;BR /&gt;id-type name&lt;BR /&gt;remote-name Hub2&lt;BR /&gt;remote-address ISP2&lt;BR /&gt;nat traversal&lt;BR /&gt;dpd deadpeer&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set tran1&lt;BR /&gt;encapsulation-mode tunnel&lt;BR /&gt;transform esp&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;esp encryption-algorithm 3des&lt;BR /&gt;#&lt;BR /&gt;ipsec policy vpn 10 isakmp&lt;BR /&gt;security acl 3001&lt;BR /&gt;ike-peer spoke&lt;BR /&gt;transform-set tran1&lt;BR /&gt;sa duration time-based 28800&lt;BR /&gt;#&lt;BR /&gt;ipsec policy vpn 20 isakmp&lt;BR /&gt;security acl 3002&lt;BR /&gt;ike-peer spoke2&lt;BR /&gt;transform-set tran1&lt;BR /&gt;sa duration time-based 28800&lt;BR /&gt;#&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;nat outbound 3005&lt;BR /&gt;ip address dhcp-alloc&lt;BR /&gt;ipsec policy vpn&lt;BR /&gt;#&lt;BR /&gt;ip route-static 0.0.0.0 0.0.0.0 SpokeISP&lt;BR /&gt;ip route-static 192.168.10.0 255.255.255.0 SpokeISP&lt;BR /&gt;#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Jan 2015 03:19:51 GMT</pubDate>
    <dc:creator>Ayeesha</dc:creator>
    <dc:date>2015-01-06T03:19:51Z</dc:date>
    <item>
      <title>IPsec Dual ISP Failover</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-dual-isp-failover/m-p/6690812#M266</link>
      <description>&lt;P&gt;Hi all!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been working on IPsec dual ISP failover setup using 3 HP MSR routers. The setup looks like the one below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| -- Hub1 -- via ISP1-- \&lt;/P&gt;&lt;P&gt;LAN (192.168.10.x) -- | &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;gt;&amp;gt;&amp;gt; Spoke (10.10.20.x)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| -- Hub2 -- via ISP2-- /&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Hub1 has static, Hub2 and&amp;nbsp;Spoke has dynamic IP address (Hub2 will be static in the future actual implem, I just don't have another static line at the moment). Spoke connects via Hub1 but in case ISP1 goes down, it should failover to ISP2, and should go back to ISP1 again in case ISP1 goes up again (it's like preemption). Please note that I will be having several spokes in the future that's why failover between ISP1 and ISP2 is important.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was already able to up the two tunnels to the Hubs from the Spoke at the same time but the failover doesn't work as I intended it to be. If I down the ISP1, the traffic does not pass through ISP2 even if the tunnel to ISP2 is up. Please see configs below.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HUB1:&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike local-name Hub1&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;acl number 3001&lt;BR /&gt;description To_IPsec_Tunnel&lt;BR /&gt;rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;acl number 3005&lt;/P&gt;&lt;P&gt;description To_Internet&lt;BR /&gt;rule 0 deny ip destination 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike proposal 1&lt;BR /&gt;encryption-algorithm 3des-cbc&lt;BR /&gt;dh group2&lt;BR /&gt;sa duration 3600&lt;BR /&gt;#&lt;BR /&gt;ike peer spoke&lt;BR /&gt;exchange-mode aggressive&lt;BR /&gt;pre-shared-key xxx&lt;BR /&gt;id-type name&lt;BR /&gt;remote-name Spoke&lt;BR /&gt;nat traversal&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set tran1&lt;BR /&gt;encapsulation-mode tunnel&lt;BR /&gt;transform esp&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;esp encryption-algorithm 3des&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec policy vpn 20 isakmp&lt;BR /&gt;security acl 3001&lt;/P&gt;&lt;P&gt;ike-peer spoke&lt;BR /&gt;transform-set tran1&lt;BR /&gt;sa duration time-based 28800&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;nat outbound 3005&lt;BR /&gt;ip address ISP1&lt;BR /&gt;ipsec policy vpn&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ip route-static 0.0.0.0 0.0.0.0 ISP1&lt;BR /&gt;ip route-static 10.10.20.0 255.255.255.0 ISP1&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec policy vpn local-address LoopBack0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hub2:&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike local-name Hub2&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;acl number 3001&lt;BR /&gt;description To_IPsec_Tunnel&lt;BR /&gt;rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;acl number 3005&lt;/P&gt;&lt;P&gt;description To_Internet&lt;BR /&gt;rule 0 deny ip destination 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike proposal 1&lt;BR /&gt;encryption-algorithm 3des-cbc&lt;BR /&gt;dh group2&lt;BR /&gt;sa duration 3600&lt;BR /&gt;#&lt;BR /&gt;ike peer spoke2&lt;BR /&gt;exchange-mode aggressive&lt;BR /&gt;pre-shared-key xxx&lt;BR /&gt;id-type name&lt;BR /&gt;remote-name Spoke&lt;BR /&gt;nat traversal&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set tran1&lt;BR /&gt;encapsulation-mode tunnel&lt;BR /&gt;transform esp&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;esp encryption-algorithm 3des&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec policy vpn 20 isakmp&lt;BR /&gt;security acl 3001&lt;/P&gt;&lt;P&gt;ike-peer spoke2&lt;BR /&gt;transform-set tran1&lt;BR /&gt;sa duration time-based 28800&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;nat outbound 3005&lt;BR /&gt;ip address&amp;nbsp;dhcp-alloc&lt;BR /&gt;ipsec policy vpn&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ip route-static 0.0.0.0 0.0.0.0 ISP2&lt;BR /&gt;ip route-static 10.10.20.0 255.255.255.0 ISP2&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec policy vpn local-address LoopBack0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Spoke:&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike local-name Spoke&lt;BR /&gt;#&lt;BR /&gt;acl number 3001&lt;BR /&gt;description To_IPsec_Tunnel&lt;BR /&gt;rule 5 permit ip source 10.10.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255&lt;BR /&gt;acl number 3002&lt;BR /&gt;description To_IPSec_Tunnel&lt;BR /&gt;rule 5 permit ip source 10.10.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255&lt;BR /&gt;acl number 3005&lt;BR /&gt;description To_Internet&lt;BR /&gt;rule 3 deny ip destination 192.168.10.0 0.0.0.255&lt;BR /&gt;rule 5 permit ip source 10.10.20.0 0.0.0.255&lt;BR /&gt;#&lt;BR /&gt;ike proposal 1&lt;BR /&gt;encryption-algorithm 3des-cbc&lt;BR /&gt;dh group2&lt;BR /&gt;sa duration 3600&lt;BR /&gt;#&lt;BR /&gt;ike dpd deadpeer&lt;BR /&gt;#&lt;BR /&gt;ike peer spoke&lt;BR /&gt;exchange-mode aggressive&lt;BR /&gt;pre-shared-key xxx&lt;BR /&gt;id-type name&lt;BR /&gt;remote-name Hub1&lt;BR /&gt;remote-address ISP1&lt;BR /&gt;nat traversal&lt;BR /&gt;dpd deadpeer&lt;BR /&gt;#&lt;BR /&gt;ike peer spoke2&lt;BR /&gt;exchange-mode aggressive&lt;BR /&gt;pre-shared-key xxx&lt;BR /&gt;id-type name&lt;BR /&gt;remote-name Hub2&lt;BR /&gt;remote-address ISP2&lt;BR /&gt;nat traversal&lt;BR /&gt;dpd deadpeer&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set tran1&lt;BR /&gt;encapsulation-mode tunnel&lt;BR /&gt;transform esp&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;esp encryption-algorithm 3des&lt;BR /&gt;#&lt;BR /&gt;ipsec policy vpn 10 isakmp&lt;BR /&gt;security acl 3001&lt;BR /&gt;ike-peer spoke&lt;BR /&gt;transform-set tran1&lt;BR /&gt;sa duration time-based 28800&lt;BR /&gt;#&lt;BR /&gt;ipsec policy vpn 20 isakmp&lt;BR /&gt;security acl 3002&lt;BR /&gt;ike-peer spoke2&lt;BR /&gt;transform-set tran1&lt;BR /&gt;sa duration time-based 28800&lt;BR /&gt;#&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;nat outbound 3005&lt;BR /&gt;ip address dhcp-alloc&lt;BR /&gt;ipsec policy vpn&lt;BR /&gt;#&lt;BR /&gt;ip route-static 0.0.0.0 0.0.0.0 SpokeISP&lt;BR /&gt;ip route-static 192.168.10.0 255.255.255.0 SpokeISP&lt;BR /&gt;#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 03:19:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-dual-isp-failover/m-p/6690812#M266</guid>
      <dc:creator>Ayeesha</dc:creator>
      <dc:date>2015-01-06T03:19:51Z</dc:date>
    </item>
  </channel>
</rss>

