<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to shut down ASA Site to Site VPN tunnel without removing it in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726651#M13388</link>
    <description>&lt;P&gt;I got an error trying to remove the acls , said it was in use.&amp;nbsp; I'll have to try again tomorrow.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Oct 2018 21:56:09 GMT</pubDate>
    <dc:creator>rmorenobb</dc:creator>
    <dc:date>2018-10-16T21:56:09Z</dc:date>
    <item>
      <title>How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726617#M13303</link>
      <description>&lt;P&gt;How to shut down ASA Site to Site VPN tunnel without removing it?&amp;nbsp; I only want to temporarily shut down the VPN tunnel for testing on another firewall, since the peers have similar interesting traffic, but I don't want to remove the existing VPN tunnel, just shut down temporarily.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is an old ASA 5510&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;crypto map XXCryptoMap 16 set peer&amp;nbsp;1.1.1.1 2.2.2.2&lt;/DIV&gt;
&lt;DIV&gt;crypto map XXCryptoMap 16 set ikev1 transform-set ESP-AES-128-SHA&lt;/DIV&gt;
&lt;DIV&gt;crypto map XXCryptoMap 16 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="chh-link--info popover-toggle chh-link--enabled" data-popover-rule="show running-config_None_None_69" data-popover-cmd="show_running-config" data-severity="info"&gt;crypto map XXCryptoMap 16 set nat-t-disable&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="chh-link--info popover-toggle chh-link--enabled" data-popover-rule="show running-config_None_None_69" data-popover-cmd="show_running-config" data-severity="info"&gt;I've read you can remove the ACL for it, but it doesn't seem to be working.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;asafirewall01# sh access-list OO_temp_XXCryptoMap16&lt;/DIV&gt;
&lt;DIV&gt;access-list OO_temp_XXCryptoMap16; 2 elements; name hash: 0xe3fb223a (dynamic)&lt;/DIV&gt;
&lt;DIV&gt;access-list OO_temp_XXCryptoMap16 line 1 extended permit ip host 10.0.1.2 host&amp;nbsp;1.1.1.1 (hitcnt=1815) 0x27ad149d&lt;/DIV&gt;
&lt;DIV&gt;access-list OO_temp_XXCryptoMap16 line 2 extended permit ip host&amp;nbsp;10.0.1.3&amp;nbsp;host&amp;nbsp;2.2.2.2 (hitcnt=2) 0x1d4b9726&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;peer address: 1.1.1.1&lt;/DIV&gt;
&lt;DIV&gt;Crypto map tag: XXCryptoMap, seq num: 16, local addr:&amp;nbsp;10.0.1.2&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;access-list OO_temp_XXCryptoMap16 extended permit ip host 10.0.1.2 host&amp;nbsp;1.1.1.1&lt;/DIV&gt;
&lt;DIV&gt;local ident (addr/mask/prot/port): (1.1.1.1/255.255.255.255/0/0)&lt;/DIV&gt;
&lt;DIV&gt;remote ident (addr/mask/prot/port): (2.2.2.2/255.255.255.255/0/0)&lt;/DIV&gt;
&lt;DIV&gt;current_peer:&amp;nbsp;1.1.1.1&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="chh-link--warning popover-toggle chh-link--enabled" data-popover-rule="show crypto ipsec sa_None_None_1" data-popover-cmd="show_crypto_ipsec_sa" data-severity="warning"&gt;#pkts encaps: 0,&lt;/SPAN&gt; #pkts encrypt: 0, #pkts digest: 0&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="chh-link--warning popover-toggle chh-link--enabled" data-popover-rule="show crypto ipsec sa_None_None_2" data-popover-cmd="show_crypto_ipsec_sa" data-severity="warning"&gt;#pkts decaps: 0,&lt;/SPAN&gt; #pkts decrypt: 0, #pkts verify: 0&lt;/DIV&gt;
&lt;DIV&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;/DIV&gt;
&lt;DIV&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/DIV&gt;
&lt;DIV&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/DIV&gt;
&lt;DIV&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/DIV&gt;
&lt;DIV&gt;#TFC rcvd: 0, #TFC sent: 0&lt;/DIV&gt;
&lt;DIV&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;/DIV&gt;
&lt;DIV&gt;#send errors: 0, #recv errors: 0&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;local crypto endpt.: 1.1.1.1/0, remote crypto endpt.:2.2.2.2/0&lt;/DIV&gt;
&lt;DIV&gt;path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;/DIV&gt;
&lt;DIV&gt;PMTU time remaining (sec): 0, DF policy: copy-df&lt;/DIV&gt;
&lt;DIV&gt;ICMP error validation: disabled, TFC packets: disabled&lt;/DIV&gt;
&lt;DIV&gt;current outbound spi: 7ACD4800&lt;/DIV&gt;
&lt;DIV&gt;current inbound spi : 72AF7097&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;inbound esp sas:&lt;/DIV&gt;
&lt;DIV&gt;spi: 0x72AF7097 (1924100247)&lt;/DIV&gt;
&lt;DIV&gt;transform: esp-aes esp-sha-hmac no compression&lt;/DIV&gt;
&lt;DIV&gt;in use settings ={L2L, Tunnel, PFS Group 2, IKEv1, }&lt;/DIV&gt;
&lt;DIV&gt;slot: 0, conn_id: 63479808, crypto-map: BBCryptoMap&lt;/DIV&gt;
&lt;DIV&gt;sa timing: remaining key lifetime (kB/sec): (4374000/27260)&lt;/DIV&gt;
&lt;DIV&gt;IV size: 16 bytes&lt;/DIV&gt;
&lt;DIV&gt;replay detection support: Y&lt;/DIV&gt;
&lt;DIV&gt;Anti replay bitmap:&lt;/DIV&gt;
&lt;DIV&gt;0x00000000 0x00000001&lt;/DIV&gt;
&lt;DIV&gt;outbound esp sas:&lt;/DIV&gt;
&lt;DIV&gt;spi: 0x7ACD4800 (2060273664)&lt;/DIV&gt;
&lt;DIV&gt;transform: esp-aes esp-sha-hmac no compression&lt;/DIV&gt;
&lt;DIV&gt;in use settings ={L2L, Tunnel, PFS Group 2, IKEv1, }&lt;/DIV&gt;
&lt;DIV&gt;slot: 0, conn_id: 63479808, crypto-map: BBCryptoMap&lt;/DIV&gt;
&lt;DIV&gt;sa timing: remaining key lifetime (kB/sec): (4374000/27260)&lt;/DIV&gt;
&lt;DIV&gt;IV size: 16 bytes&lt;/DIV&gt;
&lt;DIV&gt;replay detection support: Y&lt;/DIV&gt;
&lt;DIV&gt;Anti replay bitmap:&lt;/DIV&gt;
&lt;DIV&gt;0x00000000 0x00000001&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726617#M13303</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2020-02-21T16:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726622#M13315</link>
      <description>Hi,&lt;BR /&gt;You could disable the crypto map on the outside interface. E.g - "no crypto map XXCryptoMap interface OUTSIDE"  &amp;lt;- assuming OUTSIDE is the name of your outside interface. Of course, that would disable all VPN's on that interface, if you have any others?&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 16 Oct 2018 21:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726622#M13315</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-16T21:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726629#M13340</link>
      <description>&lt;P&gt;Thanks!&amp;nbsp; Yah, that's not what I want to do, as I have two other active tunnels that I cannot bring down, I only want to bring down the one tunnel.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 21:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726629#M13340</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2018-10-16T21:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726643#M13369</link>
      <description>Ok. When you removed the ACL did you clear the SAs (assuming they were already active)? &lt;BR /&gt;How are you routing the traffic?...if no interesting traffic is even routed via that firewall the tunnel would not establish.</description>
      <pubDate>Tue, 16 Oct 2018 21:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726643#M13369</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-16T21:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726651#M13388</link>
      <description>&lt;P&gt;I got an error trying to remove the acls , said it was in use.&amp;nbsp; I'll have to try again tomorrow.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 21:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726651#M13388</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2018-10-16T21:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726670#M13405</link>
      <description>&lt;P&gt;remove the peer IP address, or even put a&amp;nbsp; temporary deny on ISAKMp and ESP from a certain public IP, so the attempts to negotiate a tunnel from the remote end get denied by your ACL&amp;nbsp; (put a specific deny, obove the rule that allows port 500 and ESP) and enable/disable for testing purposes&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 22:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726670#M13405</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-10-16T22:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726933#M13465</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Change the pre-shared key&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 11:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726933#M13465</guid>
      <dc:creator>ramatoulaye.hane1</dc:creator>
      <dc:date>2018-10-17T11:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726982#M13474</link>
      <description>&lt;P&gt;Remove the match statement from crypto map. ASA wont allow you to remove the ACL itself without removing all the references.&lt;/P&gt;
&lt;P&gt;So if your crypto map is as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hostname(config)# crypto map abcmap 1 match address l2l_list&lt;BR /&gt; hostname(config)# crypto map abcmap 1 set peer 10.10.4.108&lt;BR /&gt; hostname(config)# crypto map abcmap 1 set ikev1 transform-set FirstSet&lt;BR /&gt; hostname(config)# crypto map abcmap 1 set ikev2 ipsec-proposal secure&lt;BR /&gt; hostname(config)# crypto map abcmap interface outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do a "no&amp;nbsp;&lt;SPAN&gt;crypto map abcmap 1 match address l2l_list" to remove the match entry from the crypto map.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 12:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3726982#M13474</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-10-17T12:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3728626#M13475</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An easier way out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Disable the ACL by making it inactive, This way there will be no active traffic running through the tunnel and the tunnel will be down.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;e.g access-list ACL-VPN extended permit ip any any inactive&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This will prevent unnecessary complexities and mistakes that may arise from removing and putting back your VPN parameters.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 13:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3728626#M13475</guid>
      <dc:creator>adedipeopeoluwa</dc:creator>
      <dc:date>2018-10-19T13:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3728685#M13483</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;You can simply remove just the set peer line and re-add it after the testing.</description>
      <pubDate>Fri, 19 Oct 2018 14:47:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3728685#M13483</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2018-10-19T14:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to shut down ASA Site to Site VPN tunnel without removing it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3732886#M13488</link>
      <description>&lt;P&gt;I did&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;conf t&lt;/P&gt;
&lt;DIV&gt;no crypto map XXCryptoMap 16 set ikev1 transform-set ESP-AES-128-SHA&lt;/DIV&gt;
&lt;DIV&gt;no crypto map XXCryptoMap 16 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;that took the tunnel down&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;and when I was done testing, i added the lines back to bring the tunnel back up&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;conf t&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;crypto map XXCryptoMap 16 set ikev1 transform-set ESP-AES-128-SHA&lt;/DIV&gt;
&lt;DIV&gt;crypto map XXCryptoMap 16 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;So thank you!&amp;nbsp; It worked nicely.&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 25 Oct 2018 16:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-shut-down-asa-site-to-site-vpn-tunnel-without-removing-it/m-p/3732886#M13488</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2018-10-25T16:01:11Z</dc:date>
    </item>
  </channel>
</rss>

