9-4
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 9 Configuring IP Routing
Configuring Static and Default Routes
Configuring Static Route Tracking
One of the problems with static routes is that there is no inherent mechanism for determining if the route
is up or down. They remain in the routing table even if the next hop gateway becomes unavailable. Static
routes are only removed from the routing table if the associated interface on the security appliance goes
down.
The static route tracking feature provides a method for tracking the availability of a static route and
installing a backup route if the primary route should fail. This allows you to, for example, define a
default route to an ISP gateway and a backup default route to a secondary ISP in case the primary ISP
becomes unavailable.
The security appliance does this by associating a static route with a monitoring target that you define. It
monitors the target using ICMP echo requests. If an echo reply is not received within a specified time
period, the object is considered down and the associated route is removed from the routing table. A
previously configured backup route is used in place of the removed route.
When selecting a monitoring target, you need to make sure it can respond to ICMP echo requests. The
target can be any network object that you choose, but you should consider using:
•
the ISP gateway (for dual ISP support) address
•
the next hop gateway address (if you are concerned about the availability of the gateway)
•
a server on the target network, such as a AAA server, that the security appliance needs to
communicate with
•
a persistent network object on the destination network (a desktop or notebook computer that may be
shut down at night is not a good choice)
You can configure static route tracking for statically defined routes or default routes obtained through
DHCP or PPPoE. You can only enable PPPoE clients on multiple interface with route tracking.
To configure static route tracking, perform the following steps:
Step 1
Configure the tracked object monitoring parameters:
a.
Define the monitoring process:
hostname(config)#
sla monitor
sla_id
If you are configuring a new monitoring process, you are taken to SLA monitor configuration mode.
If you are changing the monitoring parameters for an unscheduled monitoring process that already
has a type defined, you are taken directly to the SLA protocol configuration mode.
b.
Specify the monitoring protocol. If you are changing the monitoring parameters for an unscheduled
monitoring process that already has a type defined, you are taken directly to SLA protocol
configuration mode and cannot change this setting.
hostname(config-sla-monitor)#
type echo protocol ipIcmpEcho
target_ip
interface
if_name
The
target_ip
is the IP address of the network object whose availability the tracking process
monitors. While this object is available, the tracking process route is installed in the routing table.
When this object becomes unavailable, the tracking process removed the route and the backup route
is used in its place.
c.
Schedule the monitoring process:
hostname(config)#
sla monitor schedule
sla_id
[
life
{
forever
|
seconds
}] [
start-time
{
hh
:
mm
[:
ss
] [
month
day
|
day
month
] |
pending
|
now
|
after
hh
:
mm
:
ss
}] [
ageout
seconds
] [
recurring
]
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......