<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote office changing ISPs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4012152#M23203</link>
    <description>&lt;P&gt;Ahhh, gotcha.&amp;nbsp; Yea i was hoping i could just create a new tunnel group and change the peer IP address and be done with it.&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jan 2020 21:25:59 GMT</pubDate>
    <dc:creator>gtvit</dc:creator>
    <dc:date>2020-01-15T21:25:59Z</dc:date>
    <item>
      <title>Remote office changing ISPs</title>
      <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011267#M23197</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a remote office that is changing ISP's and just wanted to confirm the steps I would need to take in changing the firewall config for this to work.&amp;nbsp; We are currently running a ASA 5516 and have a site to site VPN from the remote to main office.&amp;nbsp; Here's what i'm thinking needs to happen:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Change the outside interface IP address to the new IP given by the new ISP.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Change the static route gateway to the new gateway given by the new ISP.&lt;/LI&gt;&lt;LI&gt;Add a secondary peer IP address in crypto maps on the main office firewall for the site to site VPN to include the new IP.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Is there anything else I'm missing?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 15:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011267#M23197</guid>
      <dc:creator>gtvit</dc:creator>
      <dc:date>2020-01-14T15:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: Remote office changing ISPs</title>
      <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011281#M23198</link>
      <description>Hi,&lt;BR /&gt;You will probably need to change the tunnel-group on the Main ASA as this will usually be named using the IP address of the remote site peer. Potentially the group-policy will be the same, unless using default.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 14 Jan 2020 15:23:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011281#M23198</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-14T15:23:10Z</dc:date>
    </item>
    <item>
      <title>Re: Remote office changing ISPs</title>
      <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011294#M23199</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; When you say tunnel-group, are you just talking about the peer IP address in the connection profile?&amp;nbsp; From what i read, you should just be able to add a secondary peer IP address under crypto maps and then delete the primary one once the secondary connection has been made.&amp;nbsp; I was just curious if anyone has had any luck with this method.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 15:36:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011294#M23199</guid>
      <dc:creator>gtvit</dc:creator>
      <dc:date>2020-01-14T15:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: Remote office changing ISPs</title>
      <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011476#M23200</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Change the outside interface IP address to the new IP given by the new ISP. &lt;STRONG&gt;correct&lt;/STRONG&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Change the static route gateway to the new gateway given by the new ISP.&amp;nbsp; &lt;STRONG&gt;if you have a dedicated ip address given from ISP. yes make sure define a static route "route outside 0.0.0.0 0.0.0.0 34.23.54.11" make sure you delete the old static route configuration. also if no public ip address given in that case "ip address dhcp setroute". &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Add a secondary peer IP address in crypto maps on the main office firewall for the site to site VPN to include the new IP.&amp;nbsp; &lt;STRONG&gt;see below&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did a similar migration. in my case i created the tunnel-group as back up. but this did not resolve the issue. than what i did was created a new tunnel. (Note, in my case. I had a out of band managment console to both boxes HQ and Branch) so i follow these config. hope it make sense to you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;existing setup was&lt;/P&gt;
&lt;PRE&gt;ASA-1(config)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;tunnel-group 123.123.123.123 type ipsec-l2l&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;tunnel-group 123.123.123.123 ipsec-attributes&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)# &lt;SPAN style="color: #ff0000;"&gt;remote-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)# &lt;SPAN style="color: #ff0000;"&gt;local-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)#&lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt; isakmp keepalive threshold 10 retry 2&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;exit&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 1 match address VPN-INTERESTING-TRAFFIC&lt;/SPAN&gt;&amp;nbsp;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 1 set peer &lt;SPAN class="ASA_RED"&gt;123.123.123.123&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 1 set ikev2 ipsec-proposal VPN-TRANSFORM&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP interface outside&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I pre-config this configuration on notepad and during the change windows created a new tunnel with new public ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ASA-1(config)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;tunnel-group 1.1.1.1 type ipsec-l2l&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;tunnel-group 1.1.1.1 ipsec-attributes&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)# &lt;SPAN style="color: #ff0000;"&gt;remote-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)# &lt;SPAN style="color: #ff0000;"&gt;local-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)#&lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt; isakmp keepalive threshold 10 retry 2&lt;/SPAN&gt;
ASA(config-tunnel-ipsec)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;exit&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 2 match address VPN-INTERESTING-TRAFFIC&lt;/SPAN&gt;&amp;nbsp;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 2 set peer &lt;SPAN class="ASA_RED"&gt;1.1.1.1&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 2 set ikev2 ipsec-proposal VPN-TRANSFORM&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP interface outside&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;once new tunnel is up and running you can delete the non-used tunnel. you can also use the command &lt;STRONG&gt;clear configure tunnel-group 123.123.123.123&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 20:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011476#M23200</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-14T20:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: Remote office changing ISPs</title>
      <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011892#M23201</link>
      <description>&lt;P&gt;Thanks for your response.&amp;nbsp; I'm a little confused regarding your second config.&amp;nbsp; You said you created a backup tunnel group but that didn't resolve the issue but isn't that what you're doing in the second config?&amp;nbsp; And regarding the peer address with the new IP, can't i just add that as a secondary in the current crypto map without adding a new one?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 15:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011892#M23201</guid>
      <dc:creator>gtvit</dc:creator>
      <dc:date>2020-01-15T15:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Remote office changing ISPs</title>
      <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011962#M23202</link>
      <description>&lt;P&gt;Hi. at work change window i was trying to be over smart &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; and did config i this which did not work.&lt;/P&gt;
&lt;P&gt;existing setup was&lt;/P&gt;
&lt;PRE&gt;ASA-1(config)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;tunnel-group 123.123.123.123 type ipsec-l2l&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;tunnel-group 123.123.123.123 ipsec-attributes&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)# &lt;SPAN style="color: #ff0000;"&gt;remote-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)# &lt;SPAN style="color: #ff0000;"&gt;local-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)#&lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt; isakmp keepalive threshold 10 retry 2&lt;/SPAN&gt;
ASA-1(config-tunnel-ipsec)# &lt;SPAN class="ASA_RED" style="color: #ff0000;"&gt;exit&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 1 match address VPN-INTERESTING-TRAFFIC&lt;/SPAN&gt;&amp;nbsp;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 1 set peer &lt;SPAN class="ASA_RED"&gt;123.123.123.123 &lt;/SPAN&gt;&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP 1 set ikev2 ipsec-proposal VPN-TRANSFORM&lt;/SPAN&gt;
ASA-1(config)# &lt;SPAN style="color: #ff0000;"&gt;crypto map CRYPTO-MAP interface outside&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;at set peer &lt;SPAN style="color: #ff0000;"&gt;&lt;SPAN class="ASA_RED"&gt;I just change the public peer ip address and expected to work which did not work. in order to make it work i have to create another tunnel-group and crypto map. Apologies for the confusion&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 17:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4011962#M23202</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-15T17:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: Remote office changing ISPs</title>
      <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4012152#M23203</link>
      <description>&lt;P&gt;Ahhh, gotcha.&amp;nbsp; Yea i was hoping i could just create a new tunnel group and change the peer IP address and be done with it.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 21:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4012152#M23203</guid>
      <dc:creator>gtvit</dc:creator>
      <dc:date>2020-01-15T21:25:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remote office changing ISPs</title>
      <link>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4012158#M23205</link>
      <description>&lt;P&gt;all the best make sure you have a pre-config on notepad in case you need to speed up due to change windows. all the best.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 21:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-office-changing-isps/m-p/4012158#M23205</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-15T21:30:30Z</dc:date>
    </item>
  </channel>
</rss>

