<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA VPN keep alive in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200399#M860916</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I know, If you setup keepalive on the tunnel group it should survive for hours/days, even after a rekey.&lt;/P&gt;&lt;P&gt;Just do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;TUNNEL&gt; ipsec-attributes&lt;/TUNNEL&gt;&lt;/P&gt;&lt;P&gt;isakmp keepalive threshold 10&lt;/P&gt;&lt;P&gt;isakmp keepalive reset 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Apr 2009 00:55:01 GMT</pubDate>
    <dc:creator>fraunhoferpt</dc:creator>
    <dc:date>2009-04-14T00:55:01Z</dc:date>
    <item>
      <title>ASA VPN keep alive</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200397#M860914</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wanted to know if there was a way to keep a tunnel active 24/7 on the ASA 5510?  My ASA is connecting to PIX 501's, Sonicwall TZ170 and 3com X5(not sure if that matters though)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200397#M860914</guid>
      <dc:creator>ciscona728</dc:creator>
      <dc:date>2019-03-11T15:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN keep alive</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200398#M860915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As long as traffic pass through the tunnel it will not be torn down, you can go ahead and set the lifetime to 86400 seconds which cause the tunnel not to renew the key for 24 hours. But if there is no activity the tunnel will always go down at least on Cisco devices. ASA AFAIK has the featuer to set the lifetime for IKE to 0 which will not bring down the IKE tunnel but IPSEC is what has to rekey and I am not sure how the other vendors will support that. Pix won't support it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Apr 2009 21:51:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200398#M860915</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-04-13T21:51:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN keep alive</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200399#M860916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I know, If you setup keepalive on the tunnel group it should survive for hours/days, even after a rekey.&lt;/P&gt;&lt;P&gt;Just do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;TUNNEL&gt; ipsec-attributes&lt;/TUNNEL&gt;&lt;/P&gt;&lt;P&gt;isakmp keepalive threshold 10&lt;/P&gt;&lt;P&gt;isakmp keepalive reset 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 00:55:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200399#M860916</guid>
      <dc:creator>fraunhoferpt</dc:creator>
      <dc:date>2009-04-14T00:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN keep alive</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200400#M860917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Keepalives are a mechanism to detect whether the peer is active or not, this will not keep a tunnel up, it will actually do the opposite: bring down the tunnel when the remote peer does not respond to DPD (keepalive) packets&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 12:43:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200400#M860917</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-04-14T12:43:20Z</dc:date>
    </item>
    <item>
      <title>ASA VPN keep alive</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200401#M860918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This is a bit old, but I am going through this issue right now. I have a site to site VPN between two sites. One location has a sonicwall and the other has a ASA5505. I have found that the tunnel stays up but when I have a client session open to the remote side's AS400 system, after about 5 minutes of inactivity on the AS400 client access window, the session is terminated. I do not mind this, but 5 minutes is a bit short. Is there a way to change this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2011 16:35:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200401#M860918</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2011-12-08T16:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN keep alive</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200402#M860919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Steven is correct, changing the ISAKMP Keepalive will only change the intervals of the DPD checks (Dead Peer Detection).&amp;nbsp; These do not count as "interesting" traffic and therefore do not reset idle timeoutes or serve to rebuild a tunnel after it has been tore down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do have the option to remove the &lt;STRONG&gt;idle timeout&lt;/STRONG&gt; on VPN connections.&amp;nbsp; See code below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;group-policy NO-TIMER internal&lt;BR /&gt;group-policy NO-TIMER attributes&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp; vpn-idle-timeout none&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would then apply this group-policy to your site-site tunnel-group:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;tunnel-group &lt;EM&gt;11.22.33.44&lt;/EM&gt; general-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; default-group-policy &lt;STRONG&gt;NO-TIMER&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, do realize this will simply remove the idle timeout.&amp;nbsp; It can not do anything about tunnel re-keys.&amp;nbsp; If your tunnel rekeys when no interesting traffic is occuring, the tunnel will not rebuild until interesting traffic is seen.&amp;nbsp; There is no way around that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you could create a script on a server in your encryption domain to send a ping every few minutes to a host on the other side.&amp;nbsp; But at least from the Firewall, there is no way of forcing the tunnel to rebuild after a rekey.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2011 17:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-keep-alive/m-p/1200402#M860919</guid>
      <dc:creator>eddie.harmoush</dc:creator>
      <dc:date>2011-12-08T17:37:14Z</dc:date>
    </item>
  </channel>
</rss>

