<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Connecting Cisco ASA 5505 to mutliple IPSec Vpn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2050999#M399297</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will this work even if i have a nat behind each 5505. for example 172.16.5.0/24 = 192.168.2.0/24 and 172.16.6.0/24 = 192.168.3.0/24.&amp;nbsp; How will the 2 endpoint networks communicate with each other if the nat is in place?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Sep 2012 15:26:34 GMT</pubDate>
    <dc:creator>kylebqmacs</dc:creator>
    <dc:date>2012-09-14T15:26:34Z</dc:date>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2050997#M399295</link>
      <description>&lt;P&gt;I need to know if this is possible.&amp;nbsp; We currently have 2 different ASA 5505 connect to our ASA5510.&amp;nbsp; We want to VPN connect the 2 5505's to each other while still mantaining connection to our 5520.&amp;nbsp; Any ideas?&amp;nbsp; I have attached pdf of what we have.&amp;nbsp; What we want is to connect traffic between the two 5505's so that devices in either location can talk to each other while still mantainig connection to the 5510.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2050997#M399295</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2019-03-11T23:54:17Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2050998#M399296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that can easily be achieved. On each 5505 add a second sequence in the crypto map and another tunnel-group for the other ASA. So on each 5505 you will have a config that is similar to that of the 5510 which has also two VPN-definitions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 15:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2050998#M399296</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-09-14T15:22:48Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2050999#M399297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will this work even if i have a nat behind each 5505. for example 172.16.5.0/24 = 192.168.2.0/24 and 172.16.6.0/24 = 192.168.3.0/24.&amp;nbsp; How will the 2 endpoint networks communicate with each other if the nat is in place?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 15:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2050999#M399297</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-09-14T15:26:34Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051000#M399298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kyle,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So basically you want to communicate between both 5505 branches over an IPSec tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it can be done &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to create a VPN tunnel from both ASA's 5505 to the ASA5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then permit the traffic from each of those branches to each other in the crypto ACL to the ASA 5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any question..Sure.. Just remember to rate all of my answers.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 15:26:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051000#M399298</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-14T15:26:36Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051001#M399299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There won't be any challenge in that as long as your sites don't have overlapping IP-space. Just configure NAT-Excemption for the VPN-Traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 15:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051001#M399299</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-09-14T15:33:11Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051002#M399300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good news is i already have the ipsec tunnel created for the 2 5505's connecting to the 5510.&amp;nbsp; How would the rule look when i add it to the acl.&amp;nbsp; Do i add something on the inside or outside?&amp;nbsp; would it be 5505-2 any ip to 5505-1 and vice versa?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 15:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051002#M399300</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-09-14T15:33:47Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051003#M399301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kyle,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It needs to be the crypto ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also remember to perform a nat (outside,outside) from the two remote offices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want you can post the 5520 configuration and the subnets that need to talk to each other ( 5505 vs 5505)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Any question..Sure.. Just remember to rate all of my answers.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 16:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051003#M399301</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-14T16:04:10Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051004#M399302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only issue is that we dont want them to route back through our network just for them to talk to each other.&amp;nbsp; Can i not just setup another ipsec vpn on the each 5505 with one as host and the other as client?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 16:40:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051004#M399302</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-09-14T16:40:02Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051005#M399303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kyle,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if the 3 of them are reachable over the internet then yes, you can have a l2l between both ASA's without not going to the ASA 5520,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Any other question..Sure.. Just remember to rate all of my answers.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 17:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051005#M399303</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-14T17:08:44Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051006#M399304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know how to create the connection from a client to host.&amp;nbsp; How do i setup the 5505 as a host using asdm.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 17:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051006#M399304</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-09-14T17:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051007#M399305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can control that with the crypto definition. Perhaps it's best to post the output of the following commands of both 5505s:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;sh run crypto map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;sh run tunnel-group&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we can tell you what you need to add.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 17:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051007#M399305</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-09-14T17:23:33Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051008#M399306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am unable to post config for security reasons.&amp;nbsp; Can you guys post an example and show me what to add.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 12:58:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051008#M399306</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-09-17T12:58:49Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051009#M399307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok.&amp;nbsp; I have it working.&amp;nbsp; However i have ping each of the devices from each other.&amp;nbsp; Is there a way to auto establish the route?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another similar issue i have is getting 2 asas that are both connected to same ipsec tunnel communicate with each other without having to ping each other to establish a route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 16:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051009#M399307</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-09-17T16:17:02Z</dc:date>
    </item>
    <item>
      <title>Connecting Cisco ASA 5505 to mutliple IPSec Vpn</title>
      <link>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051010#M399308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Havent heard anything from you guys in a while.&amp;nbsp; Any ideas??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 16:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-cisco-asa-5505-to-mutliple-ipsec-vpn/m-p/2051010#M399308</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-09-18T16:09:41Z</dc:date>
    </item>
  </channel>
</rss>

