<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Active/Active ASA remote VPN access limitations. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/active-active-asa-remote-vpn-access-limitations/m-p/1772060#M530396</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Hi Experts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;We have an Active/Active ASA 5520 setup, as i know in Active/Active setup there is no remote VPN access, So i could overcome this limitations?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I have a solution but i dont know if it is ablecable or not? we have a spare ASA 5510, so i can use it behind Active/Active Firewalls and assign a public static NAT IP address to it and open all IPSEC and VPN ports and let the remote users to connect to it, is this ablecable setup or not? please advise.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks in advance&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:27:14 GMT</pubDate>
    <dc:creator>Mahmoud Nossair</dc:creator>
    <dc:date>2019-03-11T21:27:14Z</dc:date>
    <item>
      <title>Active/Active ASA remote VPN access limitations.</title>
      <link>https://community.cisco.com/t5/network-security/active-active-asa-remote-vpn-access-limitations/m-p/1772060#M530396</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi Experts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;We have an Active/Active ASA 5520 setup, as i know in Active/Active setup there is no remote VPN access, So i could overcome this limitations?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I have a solution but i dont know if it is ablecable or not? we have a spare ASA 5510, so i can use it behind Active/Active Firewalls and assign a public static NAT IP address to it and open all IPSEC and VPN ports and let the remote users to connect to it, is this ablecable setup or not? please advise.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks in advance&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-active-asa-remote-vpn-access-limitations/m-p/1772060#M530396</guid>
      <dc:creator>Mahmoud Nossair</dc:creator>
      <dc:date>2019-03-11T21:27:14Z</dc:date>
    </item>
    <item>
      <title>Active/Active ASA remote VPN access limitations.</title>
      <link>https://community.cisco.com/t5/network-security/active-active-asa-remote-vpn-access-limitations/m-p/1772061#M530397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mahmoud, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, deployments like this do exist in the wild &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;People put the VPN termination either in a DMZ module or outside.&lt;/P&gt;&lt;P&gt;The thing to remember that if a VPN device is behind NAT it will use UDP/4500 from MM5 or AM3, so no ESP/AH packets will/should be seen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Sep 2011 17:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-active-asa-remote-vpn-access-limitations/m-p/1772061#M530397</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2011-09-20T17:47:52Z</dc:date>
    </item>
  </channel>
</rss>

