<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Daniel, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955347#M144633</link>
    <description>&lt;P&gt;Hi Daniel,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note that there was an enhancement request filed for this and the support for source interface based enrollment has been introduced in ASA software version 9.5(1).&lt;/P&gt;
&lt;P&gt;Please find the release notes for the same below. In the release notes, it is mentioned that ‘enrollment source’ has been introduced in 9.5(1).&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I have verified this in my lab and see the following ’interface’ option on ASA version 9.5 for specifying the enrollment source interface –&lt;/P&gt;
&lt;P&gt;epicfw01-a/admin(config-ca-trustpoint)# enrollment ?&lt;/P&gt;
&lt;P&gt;crypto-ca-trustpoint mode commands/options:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; interface&amp;nbsp; Configure source interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp; retry&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Polling parameters&lt;/P&gt;
&lt;P&gt;&amp;nbsp; self&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enrollment will generate a self-signed certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; terminal&amp;nbsp;&amp;nbsp; Enroll via the terminal (cut-and-paste)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; url&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CA server enrollment URL&lt;/P&gt;
&lt;P&gt;Now, I understand you are using ASA 5505. Since the highest software version supported on ASA 5505 is 9.1(7), you may need a hardware upgrade to utilize this feature.&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best Regards,&lt;/P&gt;
&lt;P&gt;Deepika Mahankali&lt;/P&gt;
&lt;P&gt;CCIE#46630 (Security)&lt;/P&gt;</description>
    <pubDate>Thu, 16 Mar 2017 03:17:16 GMT</pubDate>
    <dc:creator>Deepika Mahankali</dc:creator>
    <dc:date>2017-03-16T03:17:16Z</dc:date>
    <item>
      <title>Cisco ASA - Specify source address on traffic towards NDES server</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955346#M144632</link>
      <description>&lt;P&gt;We are currently trying to get our remote Cisco ASA 5505`s to obtain a certificate from a Windows Server running NDES.&lt;/P&gt;
&lt;P&gt;The NDES server is located in a network in the datacenter (private IP`s), which all remote ASA`s can reach trough a VPN tunnel. When we try to obtain a certificate, we notice that the firewall connects from the outside interface, and therefor doesn`t use the VPN tunnel for communication. (Similar to not specifying a source interface when pinging the NDES server from the ASA.)&lt;/P&gt;
&lt;P&gt;Is there any way we can specify that the firewall should use the the inside ip address as source for traffic towards&amp;nbsp;the NDES server? If not we may have to alter the VPN tunnels, but we would really like to avoid it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955346#M144632</guid>
      <dc:creator>Daniel Fjortoft</dc:creator>
      <dc:date>2019-03-12T08:35:08Z</dc:date>
    </item>
    <item>
      <title>Hi Daniel,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955347#M144633</link>
      <description>&lt;P&gt;Hi Daniel,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note that there was an enhancement request filed for this and the support for source interface based enrollment has been introduced in ASA software version 9.5(1).&lt;/P&gt;
&lt;P&gt;Please find the release notes for the same below. In the release notes, it is mentioned that ‘enrollment source’ has been introduced in 9.5(1).&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I have verified this in my lab and see the following ’interface’ option on ASA version 9.5 for specifying the enrollment source interface –&lt;/P&gt;
&lt;P&gt;epicfw01-a/admin(config-ca-trustpoint)# enrollment ?&lt;/P&gt;
&lt;P&gt;crypto-ca-trustpoint mode commands/options:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; interface&amp;nbsp; Configure source interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp; retry&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Polling parameters&lt;/P&gt;
&lt;P&gt;&amp;nbsp; self&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enrollment will generate a self-signed certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; terminal&amp;nbsp;&amp;nbsp; Enroll via the terminal (cut-and-paste)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; url&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CA server enrollment URL&lt;/P&gt;
&lt;P&gt;Now, I understand you are using ASA 5505. Since the highest software version supported on ASA 5505 is 9.1(7), you may need a hardware upgrade to utilize this feature.&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best Regards,&lt;/P&gt;
&lt;P&gt;Deepika Mahankali&lt;/P&gt;
&lt;P&gt;CCIE#46630 (Security)&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 03:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955347#M144633</guid>
      <dc:creator>Deepika Mahankali</dc:creator>
      <dc:date>2017-03-16T03:17:16Z</dc:date>
    </item>
    <item>
      <title>Thank you Deepika Mahankali!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955348#M144634</link>
      <description>&lt;P&gt;Thank you Deepika Mahankali! I will test and come back to you!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 07:15:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955348#M144634</guid>
      <dc:creator>Daniel Fjortoft</dc:creator>
      <dc:date>2017-03-16T07:15:15Z</dc:date>
    </item>
    <item>
      <title>I have now done some testing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955349#M144636</link>
      <description>&lt;P&gt;I have now done some testing on a ASA 5506x with ASA 9.6(1). It worked!&lt;/P&gt;
&lt;P&gt;Thanks Deepika! This saves us from changing the cryptomaps on all our tunnels. I would be nice to do the same on the 5505`s, but this is at least working for the new ones.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 08:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-specify-source-address-on-traffic-towards-ndes-server/m-p/2955349#M144636</guid>
      <dc:creator>Daniel Fjortoft</dc:creator>
      <dc:date>2017-03-17T08:13:43Z</dc:date>
    </item>
  </channel>
</rss>

