<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This one is stumping me; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472986#M268246</link>
    <description>&lt;P&gt;This one is stumping me; 10000 is the default port, and it's not supposed to be enabled unless you use this command.&amp;nbsp;&amp;nbsp; Was the output from the old 5520 or the new 5545?&amp;nbsp; In this case we're primarily interested in the 5545, I think?&lt;/P&gt;&lt;P&gt;I don't have this in my configuration, which has both IKEv1 and IKEv2 enabled on the outside interface for assorted IPsec tunnels.&amp;nbsp; However, I re-created my 9.0 crypto configuration from scratch using the ASDM wizards, except for imported trustpoints, rather than trying to migrate it.&amp;nbsp; Are you actually using IPsec over TCP (protocol 6), rather than IPsec over ESP (protocol 50)?&amp;nbsp; The former is common with NAT VPN clients, while the latter is more common with lan-to-lan tunnels.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Mar 2014 19:01:20 GMT</pubDate>
    <dc:creator>James Leinweber</dc:creator>
    <dc:date>2014-03-19T19:01:20Z</dc:date>
    <item>
      <title>Conifg That isn't going from 8.4(7) to 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472981#M268228</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Been pasting config from old 5520 - 8.4(7) to 5545 - 9.1(1) and some commands are not takinf. Could anyone give me some insight as to why? There &amp;nbsp;are more but I thought I would start with these.&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint5&lt;BR /&gt;&amp;nbsp;enrollment terminal&lt;BR /&gt;&amp;nbsp;subject-name CN=FRD-INT-FW1&lt;BR /&gt;&amp;nbsp;keypair ECA&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;(ERROR: Keypair ECA doesn't exist.)&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 ipsec-over-tcp port 10000&lt;BR /&gt;(ERROR: Unable to configure IKEv1 on interface 'outside' as ipsec-over-tcp is enabled on port 10000, which is currently in use by another service. Please choose a different port for ipsec-over-tcp.&lt;BR /&gt;FRD-INT-FW1(config)# crypto ikev1 ipsec-over-tcp port 10000&lt;BR /&gt;ERROR: Port 10000 is already in use on the 'outside' interface and will not be added. &amp;nbsp;Please choose a different port for ipsec-over-tcp.)&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;(ERROR: % Invalid Hostname)&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint9 outside&lt;BR /&gt;(ERROR: Trustpoint not enrolled. &amp;nbsp;Please enroll trustpoint and try again.)&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;csd image disk0:/csd_3.6.6249-k9.pkg&lt;BR /&gt;&amp;nbsp;csd hostscan image disk0:/hostscan_3.1.04075-k9.pkg&lt;BR /&gt;&amp;nbsp;csd enable&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-3.1.04072-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect profiles skill disk0:/skill.xml&lt;BR /&gt;&amp;nbsp;anyconnect profiles skill_nam disk0:/skill_nam.nsp&lt;BR /&gt;(Must supply disk locations in flash)&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;port-forward TCR 3389 10.40.2.17 3389&lt;BR /&gt;(INFO: Local TCP Port &amp;lt;3389&amp;gt; is already in use.)&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks, Pat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:57:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472981#M268228</guid>
      <dc:creator>Patrick McHenry</dc:creator>
      <dc:date>2019-03-12T03:57:46Z</dc:date>
    </item>
    <item>
      <title>The RSA keypairs aren't</title>
      <link>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472982#M268231</link>
      <description>&lt;P&gt;The RSA keypairs aren't stored in the main configuration; they are kept in private NVRAM storage.&amp;nbsp; So prior to pasting a chunk of configuration involving a trustpoint, you need to do an export/import operation on it:&lt;/P&gt;&lt;P&gt;E.g. for certificates on the old 5520:&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;crypto ca export ASDM_TrustPoint5 pkcs12 &lt;EM&gt;YourSymmPassword&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Copy the block of text.&lt;/P&gt;&lt;P&gt;On the new 5545-x, run&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;crypto ca import ASDM_TrustPoint5 pkcs12 &lt;EM&gt;YourSymmPassword&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;and paste the block, then enter &lt;EM&gt;quit&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure what the IKE1 problem is; when I went from 8.2 to 9.0 I mostly switched to IKE2, and didn't get that.&amp;nbsp; Does &lt;EM&gt;show run | include 10000 &lt;/EM&gt;exhibit anything camping out there?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 21:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472982#M268231</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2014-03-18T21:46:43Z</dc:date>
    </item>
    <item>
      <title>Thanks Jim Output: crypto</title>
      <link>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472983#M268235</link>
      <description>&lt;P&gt;Thanks Jim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev1 ipsec-over-tcp port 10000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 14:57:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472983#M268235</guid>
      <dc:creator>Patrick McHenry</dc:creator>
      <dc:date>2014-03-19T14:57:20Z</dc:date>
    </item>
    <item>
      <title>Also, Jim - my 5520 doesn't</title>
      <link>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472984#M268237</link>
      <description>&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jim - my 5520 doesn't seem to have the command "&lt;SPAN style="color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: rgb(247, 247, 247);"&gt;crypto ca export".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: rgb(247, 247, 247);"&gt;I get:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: rgb(247, 247, 247);"&gt;Firewall# crypto ca ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: rgb(247, 247, 247);"&gt;&amp;nbsp; &amp;nbsp; server &amp;nbsp; Local Certificate Server commands&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: rgb(247, 247, 247);"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 15:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472984#M268237</guid>
      <dc:creator>Patrick McHenry</dc:creator>
      <dc:date>2014-03-19T15:04:18Z</dc:date>
    </item>
    <item>
      <title>Surprisingly, "export" is a</title>
      <link>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472985#M268242</link>
      <description>&lt;P&gt;Surprisingly, "&lt;EM&gt;export&lt;/EM&gt;" is a config-mode command.&amp;nbsp; It was introduced around 7.0, so you really should have it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 18:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472985#M268242</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2014-03-19T18:45:21Z</dc:date>
    </item>
    <item>
      <title>This one is stumping me;</title>
      <link>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472986#M268246</link>
      <description>&lt;P&gt;This one is stumping me; 10000 is the default port, and it's not supposed to be enabled unless you use this command.&amp;nbsp;&amp;nbsp; Was the output from the old 5520 or the new 5545?&amp;nbsp; In this case we're primarily interested in the 5545, I think?&lt;/P&gt;&lt;P&gt;I don't have this in my configuration, which has both IKEv1 and IKEv2 enabled on the outside interface for assorted IPsec tunnels.&amp;nbsp; However, I re-created my 9.0 crypto configuration from scratch using the ASDM wizards, except for imported trustpoints, rather than trying to migrate it.&amp;nbsp; Are you actually using IPsec over TCP (protocol 6), rather than IPsec over ESP (protocol 50)?&amp;nbsp; The former is common with NAT VPN clients, while the latter is more common with lan-to-lan tunnels.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 19:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472986#M268246</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2014-03-19T19:01:20Z</dc:date>
    </item>
    <item>
      <title>As Jim notes, it's a config</title>
      <link>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472987#M268249</link>
      <description>&lt;P&gt;As Jim notes, it's a config mode command. Your output shows you're in enable mode. Type "conf t" then retry. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 19:30:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conifg-that-isn-t-going-from-8-4-7-to-9-1-1/m-p/2472987#M268249</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-03-19T19:30:23Z</dc:date>
    </item>
  </channel>
</rss>

