<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN-reachibility from one interface to one another interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3944557#M936241</link>
    <description>&lt;P&gt;I want to establish RA-VPN. This I have successfully configured on the outside interface of our ASA-5508-X with FTD-image.&lt;BR /&gt;(and organized with FDM; no license for FMC).&lt;BR /&gt;But: on our WLAN-network, which is connected via another interface of our ASA, named airport; I want to realize VPN-connectivity too!&lt;/P&gt;&lt;P&gt;in the configuration there is a limitation of only one VPN-interface for ALL vpn-connections. How do I realize VPN-connectivity over both networks (outside and airport)? Background: Our WLAN has the same minor rights like our outside-connection. To reach our internal network it is necessary to do vpn. This should be possible for outside workers like inside workers (in the reachibility of our WLAN).&lt;BR /&gt;I tried different access-list aproaches, without success. This means: trying to reach the outside-interface over the airport-&lt;/P&gt;&lt;P&gt;interface. But this does not seem to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate any tips here&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:36:43 GMT</pubDate>
    <dc:creator>gln</dc:creator>
    <dc:date>2020-02-21T17:36:43Z</dc:date>
    <item>
      <title>VPN-reachibility from one interface to one another interface</title>
      <link>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3944557#M936241</link>
      <description>&lt;P&gt;I want to establish RA-VPN. This I have successfully configured on the outside interface of our ASA-5508-X with FTD-image.&lt;BR /&gt;(and organized with FDM; no license for FMC).&lt;BR /&gt;But: on our WLAN-network, which is connected via another interface of our ASA, named airport; I want to realize VPN-connectivity too!&lt;/P&gt;&lt;P&gt;in the configuration there is a limitation of only one VPN-interface for ALL vpn-connections. How do I realize VPN-connectivity over both networks (outside and airport)? Background: Our WLAN has the same minor rights like our outside-connection. To reach our internal network it is necessary to do vpn. This should be possible for outside workers like inside workers (in the reachibility of our WLAN).&lt;BR /&gt;I tried different access-list aproaches, without success. This means: trying to reach the outside-interface over the airport-&lt;/P&gt;&lt;P&gt;interface. But this does not seem to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate any tips here&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3944557#M936241</guid>
      <dc:creator>gln</dc:creator>
      <dc:date>2020-02-21T17:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: VPN-reachibility from one interface to one another interface</title>
      <link>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991166#M936244</link>
      <description>I have the excact same issue, Cisco please help us as this was enabled on my clients old ASA (v8.2) and is crucial for their companys operation</description>
      <pubDate>Fri, 29 Nov 2019 14:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991166#M936244</guid>
      <dc:creator>Alfred Simonarson</dc:creator>
      <dc:date>2019-11-29T14:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN-reachibility from one interface to one another interface</title>
      <link>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991380#M936245</link>
      <description>&lt;P&gt;As of the current FTD release (6.5.0.1), Cisco only supports configuration of a single interface for SSL VPN when managing with Firepower Device Manager (FDM). The same applies when using Cisco Defense Orchestrator or CDO.&lt;/P&gt;
&lt;P&gt;If you switch to Firepower Management Center (FMC) management you can configure multiple interfaces.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Nov 2019 06:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991380#M936245</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-11-30T06:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN-reachibility from one interface to one another interface</title>
      <link>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991900#M936246</link>
      <description>&lt;P&gt;This means an additional license for 500 Dollars for two devices at the moment. This for a funcionality which is realized with our old ASA 5010 with the standard ios.&lt;/P&gt;&lt;P&gt;On the other side this is a&amp;nbsp; fine operating system, can updated within minutes - on the contrary, at our old cisco it is a special enterprise to update the system - fearing that the rules of the configuration will break - while the company depends on the internet connection. So please Cisco do something or in the future: sell this cisco with the necessary configuration tools!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2019 07:21:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991900#M936246</guid>
      <dc:creator>gln</dc:creator>
      <dc:date>2019-12-02T07:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN-reachibility from one interface to one another interface</title>
      <link>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991943#M936247</link>
      <description>&lt;P&gt;To be fair, the old 5500 series ASA running 8.x software isn't protecting against 90% or more of current threats.&lt;/P&gt;
&lt;P&gt;Until Cisco updates FTD to be able to support multiple interfaces for VPN when using FDM management, you could leave the ASA sitting in a DMZ connected to the FTD device(s) and get the multiple interface support there. It's a bit of a hack design-wise but it would work.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2019 09:35:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991943#M936247</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-12-02T09:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: VPN-reachibility from one interface to one another interface</title>
      <link>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991950#M936248</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for this nice idea! In reality I will have some problems: Changing the&amp;nbsp; new firewall into productivity, which default configuration should rest on the old asa and in a condition that it works like figured out, and all this in a weekend when company activities are low.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oh yes there is Christmas coming... A few free days for my colleagues...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I will&amp;nbsp; discuss this here, it seems to be a possible workaround. I really would feel better with the new cisco.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2019 09:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-reachibility-from-one-interface-to-one-another-interface/m-p/3991950#M936248</guid>
      <dc:creator>gln</dc:creator>
      <dc:date>2019-12-02T09:50:58Z</dc:date>
    </item>
  </channel>
</rss>

