<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bridge Groups using Easy VPN - 5506X in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3873352#M1065056</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/39247"&gt;@Noclss2000&lt;/a&gt; I see no reason why the ISR1111 cannot be used for home users. Do you want to clarify your issue in more detail?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The 5506X series is now EOL, checkout the new&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/firepower-1000-series/datasheet-c78-742469.html" target="_self"&gt;Firepower 1000 series appliances&lt;/A&gt; this new hardware with FTD 6.5 code due for release later this year should also allow for switchport interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Fri, 14 Jun 2019 19:43:03 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-06-14T19:43:03Z</dc:date>
    <item>
      <title>Bridge Groups using Easy VPN - 5506X</title>
      <link>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3209731#M1065048</link>
      <description>&lt;P&gt;&amp;nbsp;Hello, I'm trying to configure a bridge group&amp;nbsp; for example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface BVI2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address&amp;nbsp;xx.xx.xx.xx xxx.xxx.xxx.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/2&lt;BR /&gt; bridge-group 2&lt;BR /&gt; nameif inside_2&lt;BR /&gt; security-level 100&lt;BR /&gt; &lt;BR /&gt; interface GigabitEthernet1/3&lt;BR /&gt; bridge-group 2&lt;BR /&gt; nameif inside_3&lt;BR /&gt; security-level 100&lt;BR /&gt; &lt;BR /&gt; interface GigabitEthernet1/4&lt;BR /&gt; bridge-group 2&lt;BR /&gt; nameif inside_4&lt;BR /&gt; security-level 100&lt;BR /&gt; &lt;BR /&gt; interface GigabitEthernet1/5&lt;BR /&gt; bridge-group 2&lt;BR /&gt; nameif inside_5&lt;BR /&gt; security-level 100&lt;BR /&gt; &lt;BR /&gt; interface GigabitEthernet1/6&lt;BR /&gt; bridge-group 2&lt;BR /&gt; nameif inside_6&lt;BR /&gt; security-level 100&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/7&lt;BR /&gt; bridge-group 2&lt;BR /&gt; nameif inside_7&lt;BR /&gt; security-level 100&lt;BR /&gt; &lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; bridge-group 2&lt;BR /&gt; nameif inside_8&lt;BR /&gt; security-level 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But i also have easy VPN setup, so when i enter 'vpnclient enable' i get this message.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;'Unable to determine Easy VPN Remote internal and external interfaces: multiple interfaces with the same security levels'&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which is fair enough!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but i want to know how to get around this issue, as I want to configure the port to effectively work as switchports but i cannot activate the VPN.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3209731#M1065048</guid>
      <dc:creator>mawright1</dc:creator>
      <dc:date>2020-02-21T14:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: Bridge Groups using Easy VPN - 5506X</title>
      <link>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3310307#M1065050</link>
      <description>&lt;P&gt;Can anyone assist with is?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to know how to configure bridge groups (switchports) but also use EZVPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 10:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3310307#M1065050</guid>
      <dc:creator>mawright1</dc:creator>
      <dc:date>2018-01-12T10:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Bridge Groups using Easy VPN - 5506X</title>
      <link>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3343895#M1065053</link>
      <description>&lt;P&gt;&amp;nbsp;I did a research in Cisco&amp;nbsp;&amp;nbsp;internal database and I was able to find that this is a limitation on the ASA. There is an enhancement request already opened but I don’t know when there will be a fix.&lt;/P&gt;
&lt;P&gt;According to Cisco database both 9.7 and 9.8 version codes are affected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please find below a direct link to the enhancements:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd79307" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd79307&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd98614" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd98614&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a workaround you can configure a Site to Site with Dynamic peer in case your ASA&amp;nbsp;has&amp;nbsp; public IP address&amp;nbsp;dynamic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 10:14:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3343895#M1065053</guid>
      <dc:creator>Filippo Carzaniga</dc:creator>
      <dc:date>2018-03-07T10:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: Bridge Groups using Easy VPN - 5506X</title>
      <link>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3873348#M1065054</link>
      <description>&lt;P&gt;Looks like this is still an issue even with 9.10(1)22.&lt;/P&gt;&lt;P&gt;We have exhausted all of our 5505's being given out to home users and others who occasionally work from home. We are receiving requests to provide more and at this point, we have zero options. We tried the ISR1111 and those don't even do vpnclient, only server. I thought the 5506-x would be ok once we did the bridge-group to get around the routed interfaces, but now we are hitting this issue. this stinks, come on cisco!&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 19:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3873348#M1065054</guid>
      <dc:creator>Noclss2000</dc:creator>
      <dc:date>2019-06-14T19:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: Bridge Groups using Easy VPN - 5506X</title>
      <link>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3873352#M1065056</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/39247"&gt;@Noclss2000&lt;/a&gt; I see no reason why the ISR1111 cannot be used for home users. Do you want to clarify your issue in more detail?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The 5506X series is now EOL, checkout the new&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/firepower-1000-series/datasheet-c78-742469.html" target="_self"&gt;Firepower 1000 series appliances&lt;/A&gt; this new hardware with FTD 6.5 code due for release later this year should also allow for switchport interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 19:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridge-groups-using-easy-vpn-5506x/m-p/3873352#M1065056</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-06-14T19:43:03Z</dc:date>
    </item>
  </channel>
</rss>

