<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remove Crypto Map remnants in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013340#M917982</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wilson &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Begin with the removal of the crypto map from the interface. Use the no form of the crypto map command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Continue to use the no form to remove the other crypto map commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set connection-type bi-directional&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set security-association lifetime seconds 28800 &lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set inheritance rule&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set phase1-mode main &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you remove a crypto map from an interface, it definitely brings down any IPsec tunnels &lt;/P&gt;&lt;P&gt;associated with that crypto map, you will then need to apply the crypto map back to the interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards MJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 22 Jun 2008 19:57:59 GMT</pubDate>
    <dc:creator>mj11</dc:creator>
    <dc:date>2008-06-22T19:57:59Z</dc:date>
    <item>
      <title>Remove Crypto Map remnants</title>
      <link>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013338#M917954</link>
      <description>&lt;P&gt;I have an ASA5510 7.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an old crypto map coming up in debug that I am trying to get rid of.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I used the "no cry map x" to remove and I am getting this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"IPSEC(crypto_map_check): crypto map Map 7 incomplete.  No peer ,access-list or&lt;/P&gt;&lt;P&gt;transform-set specified."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I do a "sh run all crypto" I can see remnants of this config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map  7 set connection-type bi-directional&lt;/P&gt;&lt;P&gt;crypto map  7 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map  7 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map  7 set inheritance rule&lt;/P&gt;&lt;P&gt;crypto map  7 set phase1-mode main&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have read I can do a "clear config cry map Map 7"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I do not have the option of "config" when I do "clear"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I remove this ghost crypto map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This does not work:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;no crypto map  7 set connection-type bi-directional&lt;/P&gt;&lt;P&gt;no crypto map  7 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;no crypto map  7 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;no crypto map  7 set inheritance rule&lt;/P&gt;&lt;P&gt;no crypto map  7 set phase1-mode main&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:02:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013338#M917954</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2019-03-11T13:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Remove Crypto Map remnants</title>
      <link>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013339#M917966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to do &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(config)# clear configure crypto map Map 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this not work ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c2_72.html#wp2158588" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c2_72.html#wp2158588&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jun 2008 19:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013339#M917966</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-06-22T19:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: Remove Crypto Map remnants</title>
      <link>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013340#M917982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wilson &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Begin with the removal of the crypto map from the interface. Use the no form of the crypto map command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Continue to use the no form to remove the other crypto map commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set connection-type bi-directional&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set security-association lifetime seconds 28800 &lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set inheritance rule&lt;/P&gt;&lt;P&gt;ASA(config)#no crypto map 7 set phase1-mode main &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you remove a crypto map from an interface, it definitely brings down any IPsec tunnels &lt;/P&gt;&lt;P&gt;associated with that crypto map, you will then need to apply the crypto map back to the interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards MJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jun 2008 19:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013340#M917982</guid>
      <dc:creator>mj11</dc:creator>
      <dc:date>2008-06-22T19:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remove Crypto Map remnants</title>
      <link>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013341#M917992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That worked. I tried that earlier, but don't know what I did wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks once again for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you usually go straight to the command reference for issues like this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess that is what I need to be doing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a post about the IPS and Firewall as seperate levels of access if you are up for it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2008 00:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013341#M917992</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2008-06-23T00:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Remove Crypto Map remnants</title>
      <link>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013342#M918000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPS not something i have much experience with to be honest so not sure how much help i can be. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Do you usually go straight to the command reference for issues like this?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I often refer to the configuration guides/command references if i either can't remember something or need to confirm something. It's often the quickest way. You may already know this but just in case &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;easiest way (for me anyway) to get to these docs is from the Cisco home page select "Products and Services" from bar along the top. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You get a drop down box and you can select your category - in this instance "Security".  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are then presented with a page with all the security products. Select the product you are interested in eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Cisco ASA 5500 Series Adaptive Security Appliances"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then on the next page as you scroll down there is a box headed "Support". In this box are links to command references/configuration docs etc. for the product. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do this with all major products.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies if i am telling you something you already know, it's just that sometimes Cisco info can be a bit hard to find.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2008 10:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013342#M918000</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-06-23T10:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: Remove Crypto Map remnants</title>
      <link>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013343#M918006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No need to apologize jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have always been a great help with a pleasant demeanor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate greatly your willingness to assist guys like me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ususally go to the support docs, but they almost never are a help because they are so generic for the most part.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2008 16:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remove-crypto-map-remnants/m-p/1013343#M918006</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2008-06-23T16:42:04Z</dc:date>
    </item>
  </channel>
</rss>

