Cisco Firewall :: ASA 5520 K8 - IOS Upgrade And Site To Site VPN
Feb 20, 2013
I have asa 5520 k8 model presently i am running with IOS version 8.0(4) i am upgrading to 8.2(5) is ? any license required from Cisco to upgrade to this IOS, and also let me know how many site to site vpn can be configure on this device.
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited
Maximum VLANs : 150
Inside Hosts : Unlimited
Failover : Active/Active
[code]...
This platform has an ASA 5520 VPN Plus license. Serial Number: JMX1051K2S5.
I'm having slow performance thru a Site to Site VPN. I have an ASA 5520 in each site with the version 8.2(4) in both ASA's. I have a 20Mb internet service in one side and in the other side I have 50Mb. When I transfer a file from the Sita A to Site B I get a transfer rate of 130KB/S.
We have ordered a pair of Cisco ASA5520 (ASA5520-BUN-K9).Now there is a requirement to terminate site-to-site VPN from remote site. Do we need VPN plus licence for this and how much it cost?
We have configured a site to site tunnel from our ASA to another organizations Cisco 3030. It appears to have just one way initiation. We can do a ping to a device on the remote site and it will ping just fine. however, when the tunnel needs to be initiated from the remote site, it will not work until we have initiated the tunnel and then everything works.
I continue to see Error processing payload: Payload ID: 1 errors on the ASDM logs.It appears that all the configuration is in place because we can in fact establish the IPSec tunnel unidirectional. And once established, traffic can flow bidirectional.
What are the possibilities that exist for running a site to site vpn in our environment with the following infrastructure Cisco ASA 5520 - running on a multiple context mode
-Cisco 3750 switches -Microsoft TMG
I believe these options are limited in terms of providing end point for VPN.Is there a VPN module that we can buy for 5520 to run IPSEC VPN?
Have asa 5520 ver 8.0(4) I have vpn client access created and working I have l2l vpn created and working with another set of asa The issue at hand VPN client from internet connects and authenticates, this client can access Site A's networks with no problems. However vpn client on Site A ASA can not access Networks through l2l tunnel located at Site B.
I am trying to establish routing between two Site to Site vpn tunnels, both of which are terminating on the same outside interface of my Cisco ASA.
find attached Network Diagram for the same. All Firewalls used are Cisco ASA 5520.
Both VPN tunnels between Point A and Point B, Point B and Point C too are up. I have enabled Same security level intra interface permit command also.
How do i enable traffic originating from LAN Subnets behind Point A to reach LAN Subnets behind Point C without having to create a Seperate tunnel between Point A and Point C
We have a site-site and remote vpn configured in same interface in ASA 5520 ( software version 8.3 ). When Remote vpn users try to connect to computers located on the distant end of site-site VPN, their request failed. I tried No-Nat between remote vpn private IP to the remote site private IP, also stated the same in Split tunneling. I cant find even the tracert, ping also timed out.
I recently faced an issue at work. Clients want to make ipsec site-to-site vpn redundant. I have 2-asa-5520 working in a stack. Is it possible to configure site-to-site vpn in a redundant mode, like first peer ip address is x.x.x.x and secondary is y.y.y.y (backup) ?
I am building a site to site VPN from our headquarters to a customer. I am using an ASA 5520. The customer is using Cisco 3945 routers. The customer has two VPN termination points. The customer requests that we make one of their termination points the primary VPN connection and make the other termination point the backup in the event that the primary VPN fails. How do I configure this on the ASA? Does the below configuration fulfill this goal?
We have 3 sites, with a Cisco ASA 5520 at each location.
HQ (Headquarters) internal network: 172.16.110.0/24, DR (Disaster Recovery) internal network: 172.16.120.0/24 BO (Branch Office) internal network: 172.16.150.0/24
HQ and DR have a 100Mbps permanent MPLS link between each other.Branch Office has a Site 2 Site VPN connection to HQ. If it fails, it establishes a Site 2 Site VPN connection to DR. This works perfectly.Now the routing issue... There is no route to the BO in the routing table at HQ/DR. The default gateway is used to reach the BO and that works for HQ when the VPN is between HQ/BO. If the VPN fails over to DR/BO, HQ can't reach BO anymore.I need to have some kind of conditional route injection from the ASA where the VPN is established. I was considering a tracked static route, but I was wondering if the S2S VPN itself has a functionality to do so. I thought the Reverse Route Injection was it but it's enabled on our crypto map and doesn't seem to work...
I have a site to site tunnel (bidirectional) configured between two ASA 5510's (head office and remote office) running 8.2.2. I'm trying to upgrade one end (head office) of the tunnel to 8.3.2 but when I do that, traffic from the remote office to the head office isn't transported. Traffic from the head office to the remote office is still fine (remote desktop sessions, etc).
A quick comparison of the 8.2.2 config and the 8.3.2 config on the head office ASA look identical in terms of the crypto/site-to-site commands.Is there any Cisco guide created yet for creating site/site tunnels under 8.3.2? I'm able to upgrade both ASA at the same time if that's determined to be a prerequisite.
I am using the Site to Site Wizard on an ASA 5520 and ASA 5505 from the ADSM. Both are using 8.4(5). When you create the configurations. Do you have to follow up the wizard configurations with manual ACL's to allow for traffic from each connected subnet to talk to each other? Or are they automatically generated in the configuration file? Have not been to school yet to properly understand how to create the VPN tunnels from the CLI and what to look for.
I am configuring Cisco ASA 5520 site to site vpn with Avaya VPN Phone? According to Avaya, the Avaya 9630 phone acts as a VPN client so a VPN router or firewall is not needed.
I'm trying to establish site to site VPN between ASA5510 to ASA5520, scenario. [code] our Vendor said to nat the local network to specific ip and use that ip as local pool,here the configuration details [code] i create static nat but its doesn't work for me phase 1 is not up, how to create nat local network to 10.10.10.10.
One of our remote sites want to use our firewall for internet access. We have setup a site-to-site VPN with a default route from the remote site to us. All traffic is routed to our firewall (5520). VPN traffic works perfect. Now the internet does not work for our remote site. Is it possible to route internet over the site-to-site tunnel?
I have a working site2site between 2 ASA5520 8.2(3)I want side A to be able telnetssh to side B's ASA.using the telnet command would do it or should I also add an access-list?
I have multiple site-to-site vpns using ASAs 5510 and 5520, tunnels were configured 3-4 years ago, and all these 3-4 years one vpn tunnel hangs until I clear isakmp sa peer. When I say hangs, I mean I can see the tunnel is UP and MM_ACTIVE with sh crypto isakmp sa, but I can not ping the remote subnets. When I clear the tunnel, it somes up again and communication is successful.
i have an ASA 5520 Version 8.0(2), i configured the VPN site to site and works fine, in the other apliance i configured the VPN Client for remote users, and works fine, but i try to cofigure the 2 VPNs on ASA 5520 on the same outside interface and i have the line "crypto map outside_map interface outside (for VPN client)", but when I configure the "crypto map VPNL2L interface outside, it overwrites the command", and therefore I can only have one connection. [code]
I have a pair of ASA 5520s configured in failover mode that also acts as VPN endpoint for about 25+ site to site ipsec VPNs. Of the 25 sites, 2 sites consistantly are having VPN issues while the other sites never have this issue.
For example, at a branch office the network is 192.168.1.0/24, and at the headquarter the ASA has an interface with network 192.168.254.0/24. VPNs are setup to tunnel all traffic destined to the headquarter network 192.168.254.0/24 and a couple of other networks with public IP addresses not directly connected to the ASA.
When the issue occurs, I can ping anything in the 192.168.1.0/24 or the 192.168.254.0/24 range across the VPN, but I cannot ping anything in the public IP range. ASDM reports that the tunnel is up. Restarting the routers at the branch offices do not work.
So far, I have been able to resolve the issue whenever it occurs by doing the following, however this issue happening more and more frequently:
first, try killing the VPN tunnel and wait for the router and ASA to re-establish the tunnel, sometime that works. If that doesn't work, I would failover to the standby ASA. Sometime even that doesn't work, then I have to reload the standby ASA before I failover to it.
All these site to site VPNs are setup the same way for the same purpose (to tunnel ad/exchange traffic), and this issue only happens to 2 of the branch offices which are using different ISPs - I even switched one of the 2 offices to a different ISP and router recently - still have the same issue.
I'm having slow performance thru a Site to Site VPN. I have an ASA 5520 in each site with the version 8.2(4) in both ASA's.I have a 20Mb internet service in one side and in the other side I have 50Mb.
When I transfer a file from the Sita A to Site B I get a transfer rate of 130KB/S
We have a site to site client that is having issue with intermittent disconnects. The Main endpoint is a CIsco ASA 5520 8.4.3 and the remote site has a a Cisco ASA 5505 8.2.5.
If we have a disconnect, we can "logout" of the Main ASA and the connection seems to find itself and traffic will flow. This take place about every 1 - 5 minutes but if you reset the crypto (which I am assuming you do) by logging out under the Logging Monitor Session - ikev1 sessions. It all starts right back up.
I am stumped. At first I thought MTUs but I am not sure that is the answer.
I've got a problem,We are having site-to-site VPN tunnel connected with our Client. Usuall the users connect remote virtual desktop(may be Vmware) through the L2L tunnel. The problem is that the remote desktop gets disconnect intermittently(around 4 to 5 times a day) and automatically reconnects after around 40Seconds or so. I can't find any problem with the L2L tunnel as it is showing up for the last 6 hours or so.Also there is no packet drops(RTO) when I ping the peer IP.
I am having a Site to site vpn between my ASA 5510 and ASA 5520.Tunnel is work s fine... but i see sometime the SA breaks down even through there is interesting traffic from one location to other. if do reinitiate the traffic the SA will come up. [code]
We are having site-to-site VPN tunnel connected with our Client. Usuall the users connect remote virtual desktop(may be Vmware) through the L2L tunnel. The problem is that the remote desktop gets disconnect intermittently(around 4 to 5 times a day) and automatically reconnects after around 40Seconds or so. I can't find any problem with the L2L tunnel as it is showing up for the last 6 hours or so.Also there is no packet drops(RTO) when I ping the peer IP.
I would like to do VPN site to site using ASA 5520:
Site A: Peer IP address: aaa.aaa.aaa.aaa/32 Local Network: bbb.bbb.bbb.bbb/32 Site B: Peer IP Address: xxx.xxx.xxx.xxx/32 Local network: yyy.yyy.yyy.yyy/32
on the wizard site to site vpn (site B) the peer network should be the site A and the local network should be the site B and remote network should be the site A right ?
the local network IP address should be not be used right by another devices right ? i can use use a single IP address instead of network range on local and remote network ? since the customer on site A provide me a single IP address ?
can i allow on site A to browse only a single IP address on my site B and allowing only ports 80 and 443, i prefer ASDM .
I have a requirement to create a site to site vpn tunnel on ASA 5510 from a remote site to my HO, ihave already other site-to-site tunnels are up and running on the ASA.The issue is my remote site has got the network address which falls in one of the subnet used in HO(192.168.10.0/24).My requirement is only My remote site need to accees couple of my servers in HO which is in 192.168.200.0/24 subnet.
I have a request to establish a site to site VPN with a customer. While collecting the information I give them our local network subnet which is a private subnet (192.168.5.0). They asked me if I could give them a public address instead. They can not work with the 192.168.5 subnet. Is this possible?
My side of the VPN is an ASA 5505 running 8.2(2). The other side i believe is a Checkpoint.
Got an ASA5505 connected to another endpoint running IPsec and being NAT'd at each end to a 10.0.0.0/24 network. I can pass other types of traffic through the ASA 5505 but not RTP traffic. The moment it is NAT'd and hits the firewall rules it gets denied by the default deny at the bottom of the list.
Currently the rules are as follows
Incoming External allow ip any any allow tcp any any allow udp any any default deny
[code].....
It wont allow us to setup a voip call...however when the same call manager sets up a voip call NOT using this ipsec tunnel it works just fine.