ASA 8.x/ASDM 6.x: Add New VPN Peer Information in an Existing Site-to-Site VPN using ASDM

Similar documents
Virtual Tunnel Interface

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

VPN Configuration Guide. Cisco ASA 5500 Series

Configuration Summary

Configuring LAN-to-LAN IPsec VPNs

Configuring Split and Dynamic DNS on the Cisco VPN 3000 Concentrator

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

How to Configure a Route-Based VPN Between Azure and a Forcepoint NGFW TECHNICAL DOCUMENT

Managing Site-to-Site VPNs: The Basics

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

See the following screens for showing VPN connection data in graphical or tabular form for the ASA.

LAN-to-LAN IPsec VPNs

How to Configure an IKEv1 IPsec Site-to-Site VPN to the Static Microsoft Azure VPN Gateway

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

ASA 8.0: How to Change the WebVPN Logo

ASA/PIX: Allow Split Tunneling for VPN Clients on the ASA Configuration Example

PIX/ASA: PPPoE Client Configuration Example

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

VPN Between Sonicwall Products and Cisco Security Appliance Configuration Example

IPsec Dead Peer Detection Periodic Message Option

ASA-to-ASA Dynamic-to-Static IKEv1/IPsec Configuration Example

Configuring the Cisco VPN 3000 Concentrator 4.7.x to Get a Digital Certificate and a SSL Certificate

Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM

Managing Site-to-Site VPNs

ASA 8.X and later: Add or Modify an Access List through the ASDM GUI Configuration Example

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 5.2

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

Table of Contents. Cisco PIX/ASA 7.x Enhanced Spoke to Spoke VPN Configuration Example

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example

Cisco Exam Questions & Answers

How to Configure an IPsec Site-to-Site VPN to a Windows Azure VPN Gateway

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

Configure IKEv1 IPsec Site-to-Site Tunnels with the ASDM or CLI on the ASA

ESET SECURE AUTHENTICATION. Cisco ASA Internet Protocol Security (IPSec) VPN Integration Guide

Cisco QuickVPN Installation Tips for Windows Operating Systems

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

VPN Connection through Zone based Firewall Router Configuration Example

How to Configure a Client-to-Site L2TP/IPsec VPN

NAC Appliance (Cisco Clean Access) In Band Virtual Gateway for Remote Access VPN Configuration Example

High Availability Options

Managing Site-to-Site VPNs: The Basics

Configuring Redundant Routing on the VPN 3000 Concentrator

ASA/PIX: Remote VPN Server with Inbound NAT for VPN Client Traffic with CLI and ASDM Configuration Example

Cisco ASA 5500 LAB Guide

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Example - Configuring a Site-to-Site IPsec VPN Tunnel

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

IOS/CCP: Dynamic Multipoint VPN using Cisco Configuration Professional Configuration Example

How to Set Up an IPsec Connection Between Two Ingate Firewalls/SIParators. Lisa Hallingström Paul Donald

Internet Key Exchange

Table of Contents. Cisco IPSec Tunnel through a PIX Firewall (Version 7.0) with NAT Configuration Example

Configuring an IPSec Tunnel Between a Cisco VPN 3000 Concentrator and a Checkpoint NG Firewall

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT

SYSLOG Enhancements for Cisco IOS EasyVPN Server

Configuration Example of ASA VPN with Overlapping Scenarios Contents

Configuring the Cisco VPN 3000 Concentrator with MS RADIUS

PIX/ASA 7.x and Later : Easy VPN with Split Tunneling ASA 5500 as the Server and Cisco 871 as the Easy VPN Remote Configuration Example

Configuring Remote Access IPSec VPNs

Google Cloud VPN Interop Guide

IPSec Between Two Cisco VPN 3000 Concentrators with Overlapping Private Networks

Configuring L2TP over IPsec

VPN Auto Provisioning

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

PIX/ASA as a DHCP Server and Client Configuration Example

ASA 7.x/PIX 6.x and Above: Open/Block the Ports Configuration Example

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

Table of Contents. Cisco Enhanced Spoke to Client VPN Configuration Example for PIX Security Appliance Version 7.0

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO

Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec

PIX/ASA 7.x ASDM: Restrict the Network Access of Remote Access VPN Users

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

L2TP Over IPsec Between Windows 2000 and VPN 3000 Concentrator Using Digital Certificates Configuration Example

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the SonicWall Firewall.

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Implementing Cisco Secure Mobility Solutions

co Configuring PIX to Router Dynamic to Static IPSec with

Case 1: VPN direction from Vigor2130 to Vigor2820

IOS Router : Easy VPN (EzVPN) in Network Extension Mode (NEM) with Split tunnelling Configuration Example

Monitoring Remote Access VPN Services

ASA Clientless SSL VPN (WebVPN) Troubleshooting Tech Note

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

VPN Troubleshooting. VPN Troubleshooting CHAPTER20. Tunnel Details

CheckPoint. Check Point Certified Security Administrator R71

Cisco Passguide Exam Questions & Answers

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

Quality of Service for VPNs

ESET SECURE AUTHENTICATION. Cisco ASA SSL VPN Integration Guide

About This Guide. Document Objectives. Audience

Implementing Core Cisco ASA Security (SASAC)

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

Contents. Introduction. Prerequisites. Background Information

Use the IPSec VPN Wizard for Client and Gateway Configurations

Swift Migration of IKEv1 to IKEv2 L2L Tunnel Configuration on ASA 8.4 Code

ASA 8.x: RSS Newsfeed for Clientless SSL VPN Configuration Example

Exam Questions

Configuration Guide Barracuda NG Firewall. TheGreenBow IPsec VPN Client. Written by: TheGreenBow TechSupport Team Company:

Transcription:

ASA 8.x/ASDM 6.x: Add New VPN Peer Information in an Existing Site-to-Site VPN using ASDM Contents Introduction Prerequisites Requirements Components Used Conventions Backround information ASDM Configuration Create a New Connection Profile Edit the Existing VPN Configuration Verify Troubleshoot IKE Initiator unable to find policy: Intf test_ext, Src: 172.16.1.103, Dst: 10.1.4.251 Related Information Introduction This document provides information about the configurational changes to make when a new VPN peer is added to the existing site-to-site VPN configuration using Adaptive Security Device Manager (ASDM). This is required in these scenarios: The Internet Service Provider (ISP) has been changed and a new set of public IP range is used. A complete re-design of the network at a site. The device used as VPN gateway at a site is migrated to a new device with a different public IP address. This document assumes that the site-to-site VPN is already configured properly and works fine. This document provides the steps to follow in order to change a VPN peer information in the L2L VPN configuration. Prerequisites Requirements Cisco recommends that you have knowledge of this topic:

ASA Site-to-Site VPN configuration example Components Used The information in this document is based on these software and hardware versions: Cisco Adapative Security Appliance 5500 series with software version 8.2 and later Cisco Adapative Security Device Manager with software version 6.3 and later Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Backround information The site-to-site VPN is working fine between the HQASA and the BQASA. Assume that the BQASA has got a complete network re-design and the IP schema has been modified at the ISP level, but all the internal subnetwork details remain the same. This sample configuration uses these IP addresses: Existing BQASA Outside IP address - 200.200.200.200 New BQASA Outside IP address - 209.165.201.2 Note: Here, only the peer information will be modified. Because there is no other change in internal subnet, the crypto access-lists remain the same. ASDM Configuration This section provides information about the possible methods used to change VPN peer information on HQASA using the ASDM. Create a New Connection Profile This can be the easier method because it does not disturb the existing VPN configuration and can create a new connection profile with the new VPN peer related information. 1. Go to Configuration > Site-to-Site VPN > Connection Profiles and click Add under the Connection Profiles area.

The Add IPSec Site-to-Site Connection Profile window opens up. 2. Under the Basic tab, provide the details for Peer IP Address, Pre-shared Key, and Protected Networks. Use all the same parameters as the existing VPN, except the peer information. Click OK. 3. Under the Advanced menu, click Crypto Map Entry. Refer to the Priority tab. This Priority is equal to the sequence number in its equivalent CLI configuration. When a lesser number than the existing crypto map entry is assigned, this new profile is executed first. The higher the priority number, the lesser the value. This is used to change the order of sequence that a specific crypto map will be executed. Click OK to complete creating the new connection profile.

This automatically creates a new tunnel-group along with an associated crypto map. Make sure you can reach the BQASA with the new IP address before you use this new connection profile. Edit the Existing VPN Configuration Another way of adding a new peer is to modify the existing configuration. The existing connection profile cannot be edited for the new peer information because it is bound to a specific peer. In order to edit the existing configuration, you need to perform these steps: 1. Create a New Tunnel Group 2. Edit the Existing Crypto Map Create a New Tunnel Group Go to Configuration > Site-to-Site VPN > Advanced > Tunnel groups and click Add to create a new tunnel-group that contains the new VPN peer information. Specify the Name and Pre-shared Key fields, then click OK. Note: Make sure the Pre-shared Key matches the other end of the VPN.

Note: In the Name field, only the IP address of the remote peer should be entered when the authentication mode is pre-shared keys. Any name can be used only when the authentication method is through certificates. This error appears when a name is added in the Name field and the authentication method is pre-shared:

Edit the Existing Crypto Map The existing crypto map can be edited in order to associate the new peer information. Complete these steps: 1. Go to Configuration > Site-to-Site VPN > Advanced > Crypto Maps, then select the required crypto map and click Edit. The Edit IPSec Rule window appears. 2. Under the Tunnel Policy (Basic) tab, in the Peer Settings area, specify the new peer in the IP Address of Peer to be added field. Then, click Add.

3. Select the existing peer IP address and click Remove to retain the new peer information only. Click OK.

Note: After you modify the peer information in the current crypto map, the Connection Profile associated with this crypto map is deleted instantly in the ASDM window. 4. The details of the encrypted networks remain the same. If you need to modify these, go to the Traffic Selection

tab. 5. Go to the Configuration > Site-to-Site VPN > Advanced > Crypto Maps pane in order to view the modified crypto map. However, these changes do not take place until you click Apply. After you click Apply, go to the Configuration > Site-to-Site VPN > Advanced > Tunnel groups menu in order to verify if an associated tunnel-group is present or not. If yes, then an associated Connection Profile will be created. Verify Use this section in order to confirm that your configuration works properly. The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT to view an analysis of show command output. Use this command to view the security association parameters specific to a single peer:show crypto ipsec sa peer <Peer IP address> Troubleshoot Use this section to troubleshoot your configuration. IKE Initiator unable to find policy: Intf test_ext, Src: 172.16.1.103, Dst: 10.1.4.251

This error is displayed in the log messages when trying to change the VPN peer from a VPN concentrator to ASA. Solution: This can be a result of improper configuration steps followed during the migration. Ensure that the crypto binding to the interface is removed before you add a new peer. Also, make sure that you used the IP address of the peer in the tunnel-group, but not the name. Related Information Site to Site (L2L) VPN with ASA Most Common VPN Problems ASA Technical Support Page Technical Support & Documentation - Cisco Systems