<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA VPN Interface should be outside interface? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135717#M892373</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lydia,&lt;/P&gt;&lt;P&gt;    Sure you can have VPN terminated at every interface of firewall, with the proper routes for peers and NAT statements are added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Dec 2008 11:07:25 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2008-12-12T11:07:25Z</dc:date>
    <item>
      <title>ASA VPN Interface should be outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135716#M892368</link>
      <description>&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is it necessary that the interface what we want to use for vpn is simultaneous the outside-interface? &lt;/P&gt;&lt;P&gt;Or is it possible to have one outside-interface and another physical interface for vpn??? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;greetings&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135716#M892368</guid>
      <dc:creator>lydia.walther</dc:creator>
      <dc:date>2019-03-11T14:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Interface should be outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135717#M892373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lydia,&lt;/P&gt;&lt;P&gt;    Sure you can have VPN terminated at every interface of firewall, with the proper routes for peers and NAT statements are added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 11:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135717#M892373</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-12-12T11:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Interface should be outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135718#M892384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can allow VPN on inside interfa&lt;/P&gt;&lt;P&gt;ce too, you can put mark in the chekbox, in IPsec connections page(ASDM)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Apr 2010 06:39:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135718#M892384</guid>
      <dc:creator>laptev.valery</dc:creator>
      <dc:date>2010-04-27T06:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Interface should be outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135719#M892389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lydia,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can terminate the vpn on any interface. Let's take the following example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Router (Remote n/w 192.168.1.1/24)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISP1&amp;nbsp;&amp;nbsp; ISP2&lt;/P&gt;&lt;P&gt;2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.3.3.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say that we have established a L2L tunnel&amp;nbsp; with a router and the network behind the router to which we want to talk is 192.168.1.1/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, on the ASA we have the default route as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0 0 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if the cryptomap is applied on outside2 interface and the tunnel gets initiated from the remote router, the packet would reach the firewall, but when the reply goes, it checks the routing table and sends the packet towards outside interface and it gets dropped. So, we need to have a specific route fro the remote n/w as follows to make it work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside2 192.168.1.0 255.255.255.0&amp;nbsp; 3.3.3.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ashu.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Apr 2010 20:14:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-interface-should-be-outside-interface/m-p/1135719#M892389</guid>
      <dc:creator>astripat</dc:creator>
      <dc:date>2010-04-27T20:14:43Z</dc:date>
    </item>
  </channel>
</rss>

