<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 and 2800 VPN router connectivity in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215705#M351085</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;LOL...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By any chance do you have any valid cisco contract that you could use to refer if further assistance ( remote session, etc) needs to be done as there are several points of failures on this case??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixup protocol ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then let me know&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Apr 2013 21:48:30 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-04-26T21:48:30Z</dc:date>
    <item>
      <title>ASA 5510 and 2800 VPN router connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215700#M351080</link>
      <description>&lt;P&gt;I have been tasked to connect a 2800 router to our ASA 5510 firewall.&amp;nbsp; The router will be used as a VPN router.&amp;nbsp; It will terminate two different VPN connections to two different networks.&amp;nbsp; I can setup the 2800 VPN config but what would I need to do to setup the firewall.&amp;nbsp; I am using an extra Ethernet port(it has 4) to directly connect the router. The FW has our outside internet connection, the DMZ, and our inside LAN connection.&amp;nbsp; I do not have a lot of experience with Firewalls and I do not want to create a security breach while trying to set this up!!&amp;nbsp; Please help. Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:34:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215700#M351080</guid>
      <dc:creator>Michael Mitchell</dc:creator>
      <dc:date>2019-03-12T01:34:31Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 and 2800 VPN router connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215701#M351081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We would be more than glad to help but we will need more information than that,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean where are you going to connect the 2800 router, on the outside or DMZ or inside interface of the ASA???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is VPN traffic the only traffic that must go from that 2800 to the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Apr 2013 23:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215701#M351081</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-24T23:08:58Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 and 2800 VPN router connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215702#M351082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me try to explain how I thought the traffic would flow and maybe you can tell me if it can be done or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have to build a GRE/IPSEC tunnel between our 2800 router and Amazon's ASW service(a virtual private cloud).&amp;nbsp; I wanted the traffic to flow from Amazon over the tunnel back to our Firewall and then out the interface that is connected to the 2800 router.&amp;nbsp;&amp;nbsp; Then the router will route the traffic back out the same interface into the FW.&amp;nbsp; The FW will then push the traffic to the inside interface which is directly connected to our Core switch( our inside LAN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only traffic going between the 2800 router and the FW will be the VPN traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 20:02:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215702#M351082</guid>
      <dc:creator>Michael Mitchell</dc:creator>
      <dc:date>2013-04-25T20:02:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 and 2800 VPN router connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215703#M351083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, this can be done &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem at all &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 04:33:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215703#M351083</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-26T04:33:24Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 and 2800 VPN router connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215704#M351084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This FW is killing me...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK so I got the router connected and the tunnels configured on the router and the tunnels built on our Amazon VPC. However I cannot ping Amazon's public IP address for our tunnels from the router.&amp;nbsp; I CAN ping them from the outside interface on the FW.&amp;nbsp;&amp;nbsp; I am missing a access list or a route in the FW or something!!!&amp;nbsp; Oh and I can ping the Amazon IP addresses from my PC on the LAN as well but I cannot ping the router's IP address from my PC....&amp;nbsp; I hope this makes sense.&amp;nbsp; I know its the FW but with my limited experience with them I am having trouble getting it all setup in there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 21:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215704#M351084</guid>
      <dc:creator>Michael Mitchell</dc:creator>
      <dc:date>2013-04-26T21:46:06Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 and 2800 VPN router connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215705#M351085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;LOL...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By any chance do you have any valid cisco contract that you could use to refer if further assistance ( remote session, etc) needs to be done as there are several points of failures on this case??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixup protocol ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then let me know&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 21:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-and-2800-vpn-router-connectivity/m-p/2215705#M351085</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-26T21:48:30Z</dc:date>
    </item>
  </channel>
</rss>

