User's Manual

Table Of Contents
VPN
Configuring the Site-to-Site VPN
Cisco ISA500 Series Integrated Security Appliance Administrator Guide 253
8
IKE Policy: Choose the IKE policy used for the IPSec VPN tunnel. If the IKE
policy is not in the list, go to the IKE Policies page to create new IKE policies.
See Configuring the IPSec IKE Policies, page 254.
Transform: Choose the transform policy used for the IPSec VPN tunnel. If the
transform policy is not in the list, go to the Transform Policies page to create
new transform policies. See Configuring the IPSec Transform Policies,
page 256.
Security Time: Enter the lifetime of the IPSec Security Association (SA). The
lifetime of the IPSec SA represents the interval after which the IPSec SA
becomes invalid. The IPSec SA is renegotiated after this interval. The default
is 1 hour.
STEP 5 In the VPN Failover tab, enter the following information:
WAN Failover Enable: Click On to enable WAN Failover for the IPSec VPN
connection, or click Off to disable it. If you enable WAN Failover, the backup
WAN interface ensures that VPN traffic rolls over to the backup link
whenever the primary link fails. The security appliance will automatically
update the local WAN gateway for the VPN tunnel based on the
configurations of the backup WAN link. For this purpose, Dynamic DNS has
to be configured because the IP address will change due to failover, or let the
remote gateway use dynamic IP address.
NOTE To enable the WAN Failover for Site-to-Site VPN, make sure that the
secondary WAN interface was configured and the WAN redundancy
was set as the Failover or Load Balancing mode.
Redundant Gateway: Click On to enable Redundant Gateway, or click Off to
disable it. If you enable Redundant Gateway, when the connection of remote
gateway is down, the backup connection automatically becomes active. A
backup policy comes into effect only if the primary policy fails.
- Select Backup Policy: Choose a policy to act as a backup of this policy.
- Failback Time to Switch: Enter the number of seconds that must pass to
confirm that the primary tunnel has recovered from a failure. If the primary
tunnel is up for the specified number of seconds, the security appliance
will switch to the primary tunnel by disabling the backup tunnel.