Cisco WAN :: ASA5510 - Multiple L2L VPN With Overlapping Remote Network Ranges?

Feb 4, 2013

I have an ASA5510, and site-to-site VPN with several remote clients. I have to add another client but their network range overlaps an existing tunnel. Both are using 172.16.0.0/16. I would like to 1-to-1 NAT them as 172.17.0.0/16.
 
Is it possible to perform the NAT on my device, post-decryption, or is it necessary that I have them perform the NAT at their end?

View 2 Replies


ADVERTISEMENT

Cisco :: Overlapping IP Ranges?

Jun 1, 2012

I am trying to trouble-shoot / map out a large network with a freaking butt load of over lapping IP addresses

View 8 Replies View Related

Cisco Routers :: RV180 VPN With Multiple Network Address Ranges

Aug 2, 2012

 I have a client that needs a VPN  with multiple network address ranges on the far end of the IPSEC tunnel. Is this possible with this RV180 unit?

View 1 Replies View Related

Cisco Firewall :: ASA5510 With Multiple Context Mode / Does It Support Remote Access VPN

Jul 17, 2012

I have 2xASA5510 with securityPlus license.i have configured 3 context and Active/Active Failover.Everything works fine. But also want to use rometeAccessVPN but couldn't fine anything for VPN. does it support VPN in multiple mode?

View 3 Replies View Related

Cisco Firewall :: ASA5510 - Two Distinct Public IP Ranges On DMZ

Mar 6, 2013

I’ve been trying to figure out this for quite a while. I have a range of public IP addresses directly assigned on my dmz servers. The inside interface of ASA 5510 has one of those public IP addresses assigned (the default gateway for all dmz servers). Now I have a new range of public IPs that I also want to directly assign to new dmz servers. My goal is to have two distinct public IP ranges on dmz that should communicate between them. The inside ASA interface should be the default gateway for both networks.

View 1 Replies View Related

Cisco Switching/Routing :: 4507 Not Able To Route Multiple Ip Ranges

Apr 24, 2012

I have this cisco 4507 switch that I need to configure multiple ip ranges on. The problem is that I can only configure two ip ranges on it, one ip range on the management vlan and the other ip range on vlan 2. After I have configured these 2 vlans with different ip ranges, I can route between then and get them to talk to each other, but that is all I can do. If I add another vlan with a different IP range I cannot see it from the switch or get any of the otehr ip ranges to see it.
 
I am doing something dumb because this is a layer 4 device so it should be able to route the ip ranges. I have tried everything just cannot get it to work. I have assigned the IP range directly to the port number and directly to the vlans. Just wont work.

View 6 Replies View Related

Cisco VPN :: ASA5510 Remote Access / LAN Not Accessible Inside Network

Jan 6, 2013

I am facing a problem with Cisco ASA remote access VPN, the remote client is connected to VPN and receiving IP address but the client is not able to ping or telnet any internal network.I have attached running configuration for your reference.
 
-FW : ASA5510

-Version : 8.0
 
Site to Site VPN is working without any issues

View 10 Replies View Related

Cisco AAA/Identity/Nac :: 1113 - Multiple Network Device Groups Using One Windows Remote Agent?

May 4, 2011

I'm working with a 1113 ACS device running the 4.2.0.124 software.  I'm trying to get multiple network device groups to use an existing Remote Agent set up for authentication against our Windows domain.   For instance, we want our infrastructure switches to authenticate agains the local Active Directory and our WLC to authenticate users agains the same Active Directory.  When I try and set both network device groups to use the same remote agent, it fails and reports either the host name is already in use or the IP address overlaps with an existing remote agent.
 
The question is:
 
Can I have multiple network device groups use the same remote agent?   Or do I have to install the remote agent software on separate Windows servers in order to have different types of devices authenticate against the Windows AD? 

View 1 Replies View Related

Cisco WAN :: Getting Multiple AS Instances On ASA5510?

Jul 24, 2011

Is it possible to to have Multiple AS instances on an ASA5510?

View 1 Replies View Related

Cisco Firewall :: ASA5510 Multiple Outside Interfaces

Jun 16, 2011

We have an ASA 5510 firewall.  There are 4 ports on it configured as 2 outside, one inside, and one DMZ.  We have two cable modems attached to the outside ports.  Our plan is to have the "inside" port directed to one outside port/cable modem, and the DMZ port directed to the other outside port/cable modem.
 
We have been able to get the "inside-to-outside" setup to work but not the "DMZ-to-outside" setup (at least at the same time).First off, is this possible?  If so, what are we likely missing - some way to have a second default route for the DMZ?(My manager is the "Cisco person" here, not me, so I may not have enough info.

View 1 Replies View Related

Cisco WAN :: Config ASA5510 For Multiple IPsec Tunnels

May 13, 2013

How to configure CISCO ASA 5510 for multiple IPsec tunnels?On other side is CISCO 2801.

View 20 Replies View Related

Cisco VPN :: ASA5510 / Remote IPSEC VPN ASA Behind NAT?

Mar 18, 2012

i want to create Remote IP Sec VPN on Cisco ASA5510.Problem is this 5510ASA is behind another 5520ASA and it dont have any public IP address on any of 5510 interface.if i do static NAT of ASA 5510 Private IP on internet facing 5520 IP Public POOL, then will VPN work on 5510 ASA? and what ports need to forward on 5520 for 5510 to become IPSEC VPN head end

View 1 Replies View Related

Cisco VPN :: Remote Access VPN On ASA5510?

Dec 11, 2012

how to configure simple VPN access for a user to login to the corporate network and access the resource and get emails I do not want to use CA certificate for authentication instead a very simple method is what i plan to start up with the configuration step so i can test this out.

View 4 Replies View Related

Cisco VPN :: ASA5510 Remote Access Vpn

Sep 20, 2011

I have access to my enterprise network through Cisco VPN (software) client and it goes through remote-access ipsec vpn setup on an ASA 5510. Everything works fine.
 
But now users that connect to the enterprise network have in addition need to access remote sites networks that are connected through the site-to-site VPN tunnels: IPSec tunnels between mentioned ASA5510 and remote ASA5510s and ASA5505s in branch offices.
 
there is NAT exemption rule that exempts networks 10.1.10.0/24, 10.1.20.0/24, 10.1.30.0/24.All traffic from local network 10.1.1.0/24 have full ip connectivity with all the networks in branch offices. The PROBLEM is that remote vpn clients can reach only local network 10.1.1.0/24, but not the remote networks.
 
The ASAs in remote branch offices has set up NAT exemption towards both local network 10.1.1.0/24 and remote access clients network 10.0.5.0/28, but as I said, it doesn't go.

View 2 Replies View Related

Cisco VPN :: Remote Access VPN In ASA5510?

Mar 20, 2011

I like to create a remote access VPN in our company. But it already has a site to site VPN.
 
1. Can we implement it with existing ASA?

2. How many users can be logged in at a time?

3. Is the currently available bandwidth sufficient at a high traffic ? Current bandwidth is 2Mbps (Expect maximum 30 users at a time)

4. How can we make authentication using active directory?

5. Can we use default VPN client in windows with ASA?

6. How can we monitor user’s activity while logging in using VPN?

View 7 Replies View Related

Cisco Firewall :: ASA5510 - Traffic Between Multiple Inside Interfaces

Oct 10, 2011

I've been trying to figure this one out for quite a while.  I currently have 2 inside interfaces (data, phone) and I am moving to 3 inside interfaces (servers, workstations, phones).  I have not been able to get any traffic between the interfaces.  With the current setup it was not a major problem.  With the new setup it will be a major problem.
 
Below is a sanitized version of the config.

ASA Version 8.2(1)
!
hostname BOB

[Code].....

View 11 Replies View Related

Cisco VPN :: Remote VPN On ASA5510 Getting Static IP From ASA5520

May 22, 2013

i configured a remote VPN on cisco ASA 5520 and everythings seems to be working fine...DHCP IP were been lease to users that connect to the VPN. but the issue now is that our customer want a static IP to be given to a particular user when he connect via VPN.

View 1 Replies View Related

Cisco VPN :: ASA5510 Remote Vpn Ipsec Not Working

Feb 29, 2012

I configured my cisco client with the info from the vpn wizard and get the following error :
 
error in the cisco vpn client when enabling the log : Invalid SPI size (log) + reason 412 the remote peer is no longer responding (application) message I see via the ASDM-IDM : Built inbound UDP connection for interface WAN
  
I'll explain briefly what I'm trying to do here :
 
* Remote vpn with windows users having cisco clients
* Group authentication and in the asa5510 LOCAL authentication
 
My WAN interface contains a public ip/29 I also defined a LAN interface with security level 100 in 10.0.60.0 255.255.252.0 range the vpn dhcp range I want to attribute to vpn users : 10.0.69.0/24
 
Basically I want users to initiate the vpn tunnel to the public IP and be able only to access the LAN range with the 10.0.60.0/22 range
 
ASA Version 8.2(5)
!
hostname xxxx
domain-name xxxx

[Code].....

View 7 Replies View Related

AAA/Identity/Nac :: ASA5510 With 2 Remote Access VPN And 2 MS IAS

Jun 17, 2011

We have a Cisco 5510 with 2 IPSec Connection Profiles each using a different IAS for authentication.If we add another VPN profile we need another IAS.With Cisco ACS can it be configured for different VPN profiles from the same ASA 5510?

View 4 Replies View Related

Cisco VPN :: ASA5510 - Windows 7 Connects To It But Not Remote Desktop

Mar 15, 2010

we just got several laptops that came with Windows 7 Pro 32bit installed, and we have installed the VPN Client 5.0.06.0110.  The VPN client appears to connect to our ASA5510, but we are unable to connect to any machines on our network as it does on our XP machines. 

Furthermore, we cannot ping any as well.  Also, while connected the Windows 7 machine is still able to access internet site as if split-tunneling was configured, which its not!  I've seen alot of people posting on the internet about the same issue, but I have not run into any resolutions that work.

View 14 Replies View Related

Cisco Firewall :: Connecting ASDM To ASA5510 Over Remote VPN

Apr 19, 2011

I have two ASA5510 with a peer to peer VPN configuration which is working pretty well.I'm trying to connect to my remote ASA (ASA2) with ASDM on my PC through the VPN on the local ASA (ASA1)I already connected the ASDM to ASA1 through the inside interface but I cant connect to the ASA2 the same way (over the VPN).
 
When I ping the ASA2 inside interface from my computer, I get the following events:
 
ASA1:
192.168.1.36(My PC)                     |  512  |   192.168.2.1    |    0    |  Built outbound icmp connection
192.168.2.1(ASA2 inside interface)  |   0    |   192.168.1.36  |   512  |  Teardown icmp connection
 ASA2
192.168.1.36(My PC)                     |  512  |   192.168.2.1    |    0    |  Built local-host Corporativo(outside):192.168.1.36
192.168.2.1(ASA2 inside interface)  |   0    |   192.168.1.36  |   512  |  Built local-host identity:192.168.2.1
192.168.1.36(My PC)                     |  512  |   192.168.2.1    |    0    |  Built inbound icmp connection
192.168.1.36(My PC)                     |  512  |   192.168.2.1    |    0    |  Teardown icmp connection
 
This is my config in ASA2
 
ASA Version 8.0(5)!hostname ciscosnqdomain-name chaco.com.boenable password 8Ry2YjIyt7RRXU24 encryptedpasswd 2KFQnbNIdI.2KYOU encryptednamesname 192.168.2.10 SNQ-Servername 192.168.1.21 Srvplxaname 10.30.30.30 e-Servername 192.168.1.0 Experion-networkdns-guard!interface Ethernet0/0 nameif Corporativo security-level 0 ip address 10.64.12.6 255.255.0.0!interface Ethernet0/1 nameif ExP_LS security-level 90 ip address 192.168.2.1 255.255.255.0!interface Ethernet0/2 shutdown no nameif no security-level no ip address!interface Ethernet0/3 shutdown no nameif no security-level no ip address!interface Management0/0 nameif management security-level 100 ip address 192.168.0.2 255.255.255.0!boot system

[code]....

View 9 Replies View Related

Cisco VPN :: ASA5510 Configured Remote Access To Allow Users Log In Via SSL VPN

Apr 12, 2011

We have a high availability pair of ASA 5510's in Data Centre where we have configured remote access to allow users log in via SSL VPN, now we want to add further security to our environment we are adding endpoint assessment licenses...the question I have would I need two sets of the license ASA-ADV-END-SEC ?
 
I learned the hardway before with ASA SSL VPN licenses breaking other failover pair as it needed identical licenses on both units! Will I need 2 separate license sets to keep my firewalls in a HA pair?

View 1 Replies View Related

Cisco VPN :: ASA5510 - L2TP Remote Access Disconnects After Few Hours

Nov 17, 2011

Have a few users on Vista/7 using Windows L2TP to connect to our ASA5510. It is reported that after a few hours the connection drops. From what I have seen this can be anywhere around 5-6 hours. Of course my connection will drop after an amount of time has passed and no traffic has passed the tunnel. But the users are adament that this drops during large transfers; i.e. not a timeout issue. Before I spend anymore time on this I just want to know if this is normal behavior for a remote access L2TP using Windows to disconnect on it's own after this amount of time. Never had a reason myself to remain connected that long, and when I did I used a site 2 site tunnel.

View 2 Replies View Related

Cisco VPN :: ASA5510 Easy VPN Remote / IPsec Session Count

Feb 21, 2013

I recently upgraded our head end ASA5510 at our datacenter from 8.2.1 to 8.4.5. The ASDM was also upgraded from 6.2.1 to 7.1.(1)52. Under the old code, a remote ASA5505 connected via Easy VPN Remote showed 1 IPsec tunnel. However, after the upgrade, it shows 42 sessions. It would seem to me that each split tunnel network defined in the Easy VPN profile is being counted as a tunnel. Is it possible that I may have something misconfigured now that the code is upgraded?

View 6 Replies View Related

Cisco Firewall :: ASA5510 / Unable To Establish Remote VPN Through AnyConnect

Mar 31, 2011

We have ASA5510 with version 7.x and asdm 5.X, i upgraded it to 8.3 and asdm 6.2, and i got vpn peers 250 and 2 ssl.when i try to connect through client software , i can see in the logs UDP 500 port is created as shown below.Mar 31 2011 23:54:40 302015 94.97.180.0 57013 x.x.x.x 500 Built inbound UDP connection 56694 for outside:94.97.180.0/57013 (94.97.180.0/57013) to identity:x.x.x.x/500 (x.x.x.x/500) no other things are going on , and i get error as shown below.
 
Secure VPN Connection terminated Locally by the client
Reason 412: Remote peer is no longer Responding
Connection terminated on.
 
i am suspecting it is VPN-3DES-AES activation key issue.when i go to Remote Access VPN ---Advanced---SSL Seetings--From Left Encryption Panel Available Algorithems i have DES-SHA1 when i try to drag it tto Right panel of Active algorithems it gives me error *** below [ERROR] sl encryption rc4-sha1 des-sha1 The 3DES/AES algorithms require a VPN-3DES-AES activation key and currently in right panel of Active Algorithms i have only RC4-SHA1,

View 4 Replies View Related

Cisco Firewall :: ASA5510 Permit Incoming Connection From Remote LAN

Sep 4, 2011

Actually all service from site to site is permitted, without restriction.I want to insert an ASA to block some internet traffic on main site.I try to configure my ASA5510.No problem for outgoing connection or to permit a single service on main site.But impossible to give access to all service/connection from all remote site to main site. [code]

View 7 Replies View Related

Cisco VPN :: ASA5510 Remote IPSEC Client Not Using Dedicated IP Address

Aug 8, 2011

i am just installing my ASA 5510 and i want to configure it for remote access VPN IPSEC client.i use this doc : URl,When i start the connexion, the Client uses the first address of the pool and not the dedicated address ?,i have forget something ?

View 2 Replies View Related

Cisco VPN :: ASA5510 - Remote IPsec VPN DHCP-Server IP Assignment?

May 5, 2010

i have configure a remote access ipsec vpn in asa5510 and it is working fine when i configure local dhcp address pool assignment. but not working in dhcp-server
 
below is my configuration
 
tunnel-group test type remote-accesstunnel-group test general-attributes default-group-policy test dhcp-server 10.1.1.200tunnel-group test ipsec-attributes pre-shared-key *
group-policy test internalgroup-policy test attributes dhcp-network-scope 192.168.135.0 ipsec-udp enable ipsec-udp-port 10000
 ---snapshot Ping test to DHCP-Server 10.1.1.200----
ciscoasa# ping 10.1.1.200Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.1.1.200, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
 
the DHCP server is working when i assign ip address to the LAN network.

View 20 Replies View Related

Cisco VPN :: Dual ISPs On ASA5510 And Remote Access Client

Jul 7, 2012

i have two public IPs on ASA5510 + Remote Access VPN Client, what i want to achieve is, i want VPN client users to be able to login using any of the two ISP's IP to remote connection to the ASA. what is the command to use to achieve this.
 
Secondly, i have setup the primary link VPN through ASDM but thinking i should do the same thing and add the "backup" interface.

View 1 Replies View Related

Cisco Firewall :: ASA5510 - Web Interface On NAS From Remote Site Across VPN Tunnel?

Dec 3, 2012

I have two routers on my internal network.

10.10.199.106 is a Cisco ASA5510.

10.10.199.108 is a Sonicwall NSA 3500
 
The sonicwall handles our site to site VPN tunnels.  The Cisco handles our client to site VPN connections.
 
I have a unit that points to 10.10.199.106 (Cisco) for internet access.  All other clients on the network point to 10.10.199.108 (Sonicwall) for internet access.The device in question, a Synology NAS, is using 10.10.199.68 as it's IP address.
 
I'm trying to hit the web interface on the NAS from a remote site across our VPN tunnel.  The IP scheme on the remote end of the VPN tunnel is 192.168.72.0/24.
 
Going through the VPN, I can hit every object on the network that uses .108 (Sonicwalll) as it's gateway.  However, I cannot hit the unit that uses .106 (Cisco) as it's gateway. 
 
I added a route statement (using ASDM) that routes all traffic destined to 192.168.72.0/24 to the Sonicwall so it can send it back down the VPN tunnel.  If I'm understanding routing correctly, this should allow responses from NAS destined for 192.168.72.0/24 to go back down the VPN tunnel.

View 4 Replies View Related

Cisco VPN :: Extend Production VLAN Behind ASA5510 To Remote Site And 2821?

Feb 24, 2011

I have an ASA 5510 and would like to extend one of the subnets behind this ASA out to my house that has a cable modem, a wireless router/switch and then behind that I have a 2821 router.  I've been reading and it looks like L2TP may be the way to go but can't find and config examples.  Again, I would like to securely extend one and nail up a permanent connection of one of the VLANs in the production network all the way into my house using my cable modem and the 2821.  Any config examples!  Also, any IOS recommendations for the 2821.  Lastly, does L2TP look like the way I need to go?  I'm attaching a very basic Visio diagram of what I'm trying to do. 

View 4 Replies View Related

Cisco Security :: ASA5510 - Single Timeout Drops Remote-Desktop Session

Oct 19, 2012

Just recently we replaced our HQ Cisco-Pix with Cisco-ASA 5510.  where we have many branches connecting to our HQ through site-to-site vpn. Since putting this new ASA5510 at HQ , while we are getting a  Remote-Desktop session  into our branches clients, and at the time when even a single TIMEOUT occurs on the vpn-link  so the remote-desktop session   gets completely lost.  then we have to re-connect the session.This issue happens as i said above  when a single  timeout  occurs on the vpn link.  What is the issue with the ASA5510. because with pix we didn't have this issue,  remote-desktops were never getting lost / reset  with single  timeout

View 1 Replies View Related

Cisco Firewall :: ASA5510 - Single Timeouts Drops Remote-Desktop Session

Oct 17, 2012

Just recently we replaced our HQ Cisco-Pix with Cisco-ASA 5510.  where we have many branches connecting to our HQ through site-to-site vpn.

Since putting this new ASA5510 at HQ , while we are getting a  Remote-Desktop session  into our branches clients, and at the time when even a single TIMEOUT occurs on the vpn-link  so the remote-desktop session   gets completly lost.  then we have to re-connect the session.
 
This issue happens as i said above  when a single  timeout  occurs on the vpn link.  What is the issue with the ASA5510. because with pix we didnt have this issue,  remote-desktops were never geting lost / reset  with single  timeout

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved