<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC VPN termination on different ip in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687792#M14543</link>
    <description>&lt;P&gt;The reason is that there is a migration of firewalls. We are moving from a single firewall to a cluster. We did not have a spare ip address in the range to set as a standby address so we changed the outside ip range to one where we had a spare ip address en routed the block that was on the firewall to the new ip address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We want to terminate on the same ip address that was on the old firewall so we don't have inform all the other parties of the ip change.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Aug 2018 08:54:04 GMT</pubDate>
    <dc:creator>christian-goedhart</dc:creator>
    <dc:date>2018-08-14T08:54:04Z</dc:date>
    <item>
      <title>IPSEC VPN termination on different ip</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687714#M14539</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On my asa i have a outside ip address on the outside interface. And i have a subnet routed to said IP. Is it possible for me to use one of the routed ip addresses as gateway for the VPN tunnels? I know you can't make loopback addresses on an ASA but i was wondering if there is a different solution.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;ip address&amp;nbsp;1.1.1.1 255.255.255.0 standby&amp;nbsp;1.1.1.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Loopback1&lt;/P&gt;
&lt;P&gt;nameif VPN&lt;/P&gt;
&lt;P&gt;ip address 2.2.2.1 255.255.255.255&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto map outside_map interface&amp;nbsp;VPN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Except i can't create Loopbacks on an ASA&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687714#M14539</guid>
      <dc:creator>christian-goedhart</dc:creator>
      <dc:date>2020-02-21T16:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN termination on different ip</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687789#M14540</link>
      <description>&lt;P&gt;Typically what happens is that you use the public ip address on the outside interface your vpn termination point. and open that IP address for esp and isakmp. is there any particular reason why you want to terminate on a different public IP?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 08:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687789#M14540</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-08-14T08:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN termination on different ip</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687792#M14543</link>
      <description>&lt;P&gt;The reason is that there is a migration of firewalls. We are moving from a single firewall to a cluster. We did not have a spare ip address in the range to set as a standby address so we changed the outside ip range to one where we had a spare ip address en routed the block that was on the firewall to the new ip address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We want to terminate on the same ip address that was on the old firewall so we don't have inform all the other parties of the ip change.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 08:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687792#M14543</guid>
      <dc:creator>christian-goedhart</dc:creator>
      <dc:date>2018-08-14T08:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN termination on different ip</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687841#M14545</link>
      <description>You can't terminate VPN on another interface of the ASA. This won't work&lt;BR /&gt;for other reasons.&lt;BR /&gt;</description>
      <pubDate>Tue, 14 Aug 2018 10:22:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-termination-on-different-ip/m-p/3687841#M14545</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-08-14T10:22:19Z</dc:date>
    </item>
  </channel>
</rss>

