<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953012#M144245</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm working with hardware that's already been purchased so a little stuck when it comes to swapping it out.&lt;/P&gt;
&lt;P&gt;The idea is that a 3rd party customer will have a VPN to a single IP and that IP can move within our core to another firewall should the primary fail. &amp;nbsp;I cant use the external facing IP of the firewall as that will be a connected route to the up-steam router.&lt;/P&gt;
&lt;P&gt;Trying to get customers to configure anything beyond a single IPSEC tunnel is hard enough without asking them to create backup peers or second paths so we are trying to solve it on our side.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;</description>
    <pubDate>Wed, 14 Dec 2016 11:44:28 GMT</pubDate>
    <dc:creator>paulhughes5</dc:creator>
    <dc:date>2016-12-14T11:44:28Z</dc:date>
    <item>
      <title>ASA Loopback Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953007#M144240</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm fairly new to the ASA platform after having spent the last few years on Juniper SRX.&lt;/P&gt;
&lt;P&gt;As part of a new project we are looking to integrate some ASA5545s into a new L3VPN platform and as part of this I'd like to have traffic fail-over between sites using routing, the complication comes with how I want to handle IPSEC VPNs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;First question, do ASAs currently support loopback addresses in multi-context mode (if so where do you configure them)?&lt;/P&gt;
&lt;P&gt;Second question, can these interfaces then be used to terminate a site to site IPSEC tunnel?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any help welcome&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953007#M144240</guid>
      <dc:creator>paulhughes5</dc:creator>
      <dc:date>2019-03-12T08:39:08Z</dc:date>
    </item>
    <item>
      <title>The ASA doesn't support the</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953008#M144241</link>
      <description>&lt;P&gt;The ASA doesn't support the concept of loopback-interfaces. IPsec-VPNs are always terminated on the&amp;nbsp;IP of the interface that protects the traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2016 19:46:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953008#M144241</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-12-12T19:46:46Z</dc:date>
    </item>
    <item>
      <title>Is there an alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953009#M144242</link>
      <description>&lt;P&gt;Is there an alternative solution to allow the creation of logical interfaces I can advertise via routing protocols?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 09:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953009#M144242</guid>
      <dc:creator>paulhughes5</dc:creator>
      <dc:date>2016-12-13T09:37:11Z</dc:date>
    </item>
    <item>
      <title>No, if you need that</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953010#M144243</link>
      <description>&lt;P&gt;No, if you need that flexibility four routing-integration, an IOS-router would be the best choice. The ASA is quite limited here.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 09:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953010#M144243</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-12-13T09:44:22Z</dc:date>
    </item>
    <item>
      <title>Do you want to implement a</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953011#M144244</link>
      <description>&lt;P&gt;Do you want to implement a firewall service for l3vpn customers? In case you want to build a scalable multi-tenancy solution you might wanna look into ASAv and dedicate a virtual machine for each customer and offer redundancy using a 2nd asa for failover.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know which problems you are trying to solve with your design - maybe there is a viable alternative to l3 failover mechanisms and ipsec failover (which could be achieved using backup peers btw).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Oliver&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 10:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953011#M144244</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-12-13T10:25:06Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953012#M144245</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm working with hardware that's already been purchased so a little stuck when it comes to swapping it out.&lt;/P&gt;
&lt;P&gt;The idea is that a 3rd party customer will have a VPN to a single IP and that IP can move within our core to another firewall should the primary fail. &amp;nbsp;I cant use the external facing IP of the firewall as that will be a connected route to the up-steam router.&lt;/P&gt;
&lt;P&gt;Trying to get customers to configure anything beyond a single IPSEC tunnel is hard enough without asking them to create backup peers or second paths so we are trying to solve it on our side.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 11:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953012#M144245</guid>
      <dc:creator>paulhughes5</dc:creator>
      <dc:date>2016-12-14T11:44:28Z</dc:date>
    </item>
    <item>
      <title>The idea is that a 3rd party</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953013#M144246</link>
      <description>&lt;BLOCKQUOTE&gt;
&lt;P&gt;The idea is that a 3rd party customer will have a VPN to a single IP and that IP can move within our core to another firewall should the primary fail. &amp;nbsp;I cant use the external facing IP of the firewall as that will be a connected route to the up-steam router.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;So you have the wrong device for the right task ...&lt;/P&gt;
&lt;P&gt;For a firewall failure, there is Active/Standby HA. If the active unit fails, the standby unit takes over the VPN. But&amp;nbsp;the VPN still has to be terminated on the IP of the physical interface.&lt;/P&gt;
&lt;P&gt;What about splitting the task of firewalling (which will be done by the ASA) and VPN?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 12:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953013#M144246</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-12-14T12:03:46Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953014#M144247</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm not trying to deal with failure in the same site, this is cross site.&lt;/P&gt;
&lt;P&gt;The theory being that a customer connects to DC1 in normal operation to access their services in an L3VPN which can span multiple locations. &amp;nbsp;If the firewall in DC1 goes down for any reason I want the IPSEC tunnel to come into a firewall in DC2 which connects to the same L3VPN 'cloud'&lt;/P&gt;
&lt;P&gt;I have tried to create a 'dummy' interface and direct traffic to that however it seems the ASA won't allow you to route to the physical IP of one interface from another.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 12:52:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953014#M144247</guid>
      <dc:creator>paulhughes5</dc:creator>
      <dc:date>2016-12-14T12:52:41Z</dc:date>
    </item>
    <item>
      <title>I understand what you want,</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953015#M144248</link>
      <description>&lt;P&gt;I understand what you want, but no, that's all not supported on the ASA itself. You could try to automate things through scripting, but that would also be a highly dirty solution because it had to be done on both sides of the tunnel. Be aware that another limitation is that the ASA only does policy-based VPNs, not route-based VPNs.&lt;/P&gt;
&lt;P&gt;The ASA is a great device for Remote-Access VPNs, but for highly scalable S2S VPNs, a router is the better choice.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 13:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953015#M144248</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-12-14T13:07:47Z</dc:date>
    </item>
    <item>
      <title>Thanks, missing my SRXs</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953016#M144249</link>
      <description>&lt;P&gt;Thanks, missing my SRXs already &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 15:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953016#M144249</guid>
      <dc:creator>paulhughes5</dc:creator>
      <dc:date>2016-12-14T15:43:01Z</dc:date>
    </item>
    <item>
      <title>Support for routebased VPNs</title>
      <link>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953017#M144250</link>
      <description>&lt;P&gt;Support for routebased VPNs has been added in ASA 9.7:&lt;BR /&gt;&lt;BR /&gt;The ASA VPN module is enhanced with a new logical interface called Virtual Tunnel Interface (VTI), used to represent a VPN tunnel to a peer. This supports route based VPN with IPsec profiles attached to each end of the tunnel. Using VTI does away with the need to configure static crypto map access lists and map them to interfaces.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Source:&lt;BR /&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa97/release/notes/asarn97.html#ID-2172-00000128&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 14:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-loopback-interfaces/m-p/2953017#M144250</guid>
      <dc:creator>WHindriks</dc:creator>
      <dc:date>2017-03-13T14:06:55Z</dc:date>
    </item>
  </channel>
</rss>

