<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vpn site to site between FIREWALLS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3733550#M9426</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It sounds like you need to configure it from scratch your ASA that is.&lt;/P&gt;
&lt;P&gt;Do you know how to do that? It's not a simple task. Do you have a console cable?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 Oct 2018 09:57:09 GMT</pubDate>
    <dc:creator>Fotiosmark</dc:creator>
    <dc:date>2018-10-26T09:57:09Z</dc:date>
    <item>
      <title>vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3730584#M9300</link>
      <description>&lt;P&gt;can i have on this attached network picture how to configure vpn site to site from remote location to main headoffice location&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in remote location i have&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="265"&gt;
&lt;P&gt;Firewall/router: Make/Model/OS&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="302"&gt;
&lt;P&gt;Cisco ASA5516-X&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in HO location&amp;nbsp; they have&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="265"&gt;
&lt;P&gt;Firewall/router: Make/Model/OS&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="302"&gt;
&lt;P&gt;Fortigate 3951&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;have only one way connection from remote location to web server (main HO) (THE CONFIGURATION WILL ONLY ON MY SIDE&amp;nbsp;&lt;SPAN&gt;ASA5516-X)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;can i have the step for vpv- site to site example configurations&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;thanks&amp;nbsp; check attached pic&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3730584#M9300</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2020-02-21T16:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3730733#M9306</link>
      <description>&lt;P&gt;1st you need static Public IP for both&amp;nbsp; sites...i am guessing that is something you already have.&lt;/P&gt;
&lt;P&gt;from the ASA side built the tunnels with a preshared key and Objects of what to reach what, add it to an access list and NAT it&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you need to do the same on fortigate and Access lists must match exactly.&lt;/P&gt;
&lt;P&gt;Config example between 2 ASA Lan to Lan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*******************&lt;BR /&gt;ASAVM-ABC&lt;BR /&gt;*******************&lt;BR /&gt;&lt;BR /&gt;object network LH&lt;BR /&gt;&amp;nbsp;subnet *********** 255.255.255.248&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;object-group network LH-Lan&lt;BR /&gt;&amp;nbsp;network-object object obj-LH&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; access-list Remote-acl7 extended permit ip object LAN_FOR_VPN object obj-LH &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;crypto map VPN 90 match address Remote-acl7&lt;BR /&gt;crypto map VPN 90 set pfs &lt;BR /&gt;crypto map VPN 90 set peer ************&lt;BR /&gt;crypto map VPN 90 set ikev1 transform-set LH-Lan &lt;BR /&gt;crypto map VPN interface outside&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;crypto ipsec ikev1 transform-set LH-Lan&amp;nbsp; esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map VDC_VPN_MAP 90 set security-association lifetime seconds 3600&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;nat (inside,outside) source static LAN_FOR_VPN_SUBNET LAN_FOR_VPN_SUBNET destination static LH-Lan LH-Lan route-lookup&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;tunnel-group ************ type ipsec-l2l&lt;BR /&gt;tunnel-group *********** ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key ******&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 28800&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;**************&lt;BR /&gt;&amp;nbsp;LHASA-*****&lt;BR /&gt;&amp;nbsp;**************&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;object network LAN_FOR_VPN&lt;BR /&gt;&amp;nbsp;subnet **************&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;object network ProfitBricks &amp;nbsp;&lt;BR /&gt;&amp;nbsp;subnet 10.12.90.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;object-group network ProfitBricks_Lan&lt;BR /&gt;&amp;nbsp;network-object object obj-ProfitBricks&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list Remote-acl7 extended permit ip object LAN_FOR_VPN object obj-ProfitBricks&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;crypto map VPN 90 match address Remote-acl7&lt;BR /&gt;crypto map VPN 90 set pfs &lt;BR /&gt;crypto map VPN 90 set peer ***********&lt;BR /&gt;crypto map VPN 90 set ikev1 transform-set ProfitBricks_Lan&lt;BR /&gt;crypto map VPN interface outside&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;crypto ipsec ikev1 transform-set ProfitBricks_Lan esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map VDC_VPN_MAP 90 set security-association lifetime seconds 3600&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;nat (inside,outside) source static LAN_FOR_VPN_SUBNET LAN_FOR_VPN_SUBNET destination static ProfitBricks_Lan ProfitBricks_Lan route-lookup&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;tunnel-group ******** type ipsec-l2l&lt;BR /&gt;tunnel-group ********* ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 28800&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 13:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3730733#M9306</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-23T13:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3731465#M9313</link>
      <description>&lt;P&gt;thanks alot for the explanation&amp;nbsp; ,&amp;nbsp; can i asked you some thing&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i already got public ip from isp vendor and its active , my router isp is nokia router , , so when i ping to this ip it should be reached and should has a connectivity ? am i correct ? because its not binging the public ip ? (this is before doing any configurations still )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so the problem from isp that service not active or i should configure something in my network by adding this public ip to wan interface ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also another question :&amp;nbsp; the main office side told me that tunnel already created and no need to do any configuration from your side just check if you can reach our resources or not , but i cant ?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 09:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3731465#M9313</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-24T09:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3731475#M9316</link>
      <description>if they wish to do vpn site to site, both equipment needs configuration. if they wanted vpn dial up like cisco anyconnect, you only need username and password and their public ip.&lt;BR /&gt;&lt;BR /&gt;did the provied gave a a leased public ip? Static? Vpns site to site can be build only with Static IP which you assign at your equipment Wan interface, and the default route (next hop)</description>
      <pubDate>Wed, 24 Oct 2018 09:57:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3731475#M9316</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-24T09:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3731561#M9318</link>
      <description>&lt;P&gt;thanks for your clarification , i just contact the isp and they said its your static ip is active , so i cant ping it ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;question is i should make any configurations on my network or the isp already added on its router wan interface ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any how its active but i cant ping ? why ?&amp;nbsp; i should configure static route next ip (static ip) so my network can reach the static ip ????&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check im nw diagram&amp;nbsp; attached&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 11:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3731561#M9318</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-24T11:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3731625#M9321</link>
      <description>&lt;P&gt;ok, step 1. If an IP is not assigned to an interface, it is NOT pingable. Meaning they might have given you a static IP of 85.21.5.32 255.255.255.252 (thats an example) which therefore first usable IP you assign it to your ASA and the next IP should be the default route (we are talking about leased lines, not PPPOE dsl)&lt;/P&gt;
&lt;P&gt;So you have your ASA in WAN interface 85.21.5.33 255.255.255.252 and the default route the next ip.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So again....&lt;/P&gt;
&lt;P&gt;I have an ASA at my home and want to connect it to Office network Tunnel Lan to Lan&lt;/P&gt;
&lt;P&gt;1st contact ISP for static IP&lt;/P&gt;
&lt;P&gt;Then I assign that IP to my WAN interface with default route the next hop (i am talking basic ccna here)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the Inside interface your LAN you assign a Private (which you have to NAT if you want to get on the outside internet)&lt;/P&gt;
&lt;P&gt;ip nat inside LAN&lt;/P&gt;
&lt;P&gt;ip nat outside WAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So unless you assign that IP its never going to be reachable.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 13:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3731625#M9321</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-24T13:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3732596#M9324</link>
      <description>&lt;P&gt;so once i assign the static ip address and check the connectivity , i can check the connectivity from my side to main office sever as i told you they informed me that already vpn tunnel created with my side using static ip which already provided to them but i still didnt configure in my network&amp;nbsp; ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;am i correct ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can u give me an example of the configuration as per the attached network i sent to u&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;many thanks boss&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 10:25:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3732596#M9324</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-25T10:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3732599#M9328</link>
      <description>&lt;P&gt;can i ask u also about the static ip ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the ip static must be assign on interface of isp router (nokia) which directly connnected to ASA (isp should do that as i dont have access to isp router) ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and 2nd is an example of how to configure this static ip on asa or how to let my network has connectivity with this static ip&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check attached&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 10:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3732599#M9328</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-25T10:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3732612#M9332</link>
      <description>which devices do you have access to and can configure? the ASA is on your side or the fortigate?</description>
      <pubDate>Thu, 25 Oct 2018 10:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3732612#M9332</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-25T10:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3732633#M9334</link>
      <description>&lt;P&gt;i sent u attached of my nw , its asa and nokia router for isp company&amp;nbsp; connected directly to asa 5516-x (in my side)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;fortigate is head office side not mine , and they already informed that vpn tunnel already created with my branch office and asked me to check the connectivity to them withou any vpn configurations in my side as they said , we will explor this later after my network has connectivity to my static ip which provided from isp company then i can ping the main office server to check&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check attached pic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 11:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3732633#M9334</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-25T11:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3733550#M9426</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It sounds like you need to configure it from scratch your ASA that is.&lt;/P&gt;
&lt;P&gt;Do you know how to do that? It's not a simple task. Do you have a console cable?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Oct 2018 09:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3733550#M9426</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-26T09:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3733552#M9427</link>
      <description>Also, if we are talking about VPN tunneling, that means that they need Access lists, Nating, Preshared Key, Static IP from the tunneling, Crypto maps etc etc....So you won't have access to the HQ unless somehow you get into HQ network with VPN - Dialed or Lan2Lan - &lt;BR /&gt;&lt;BR /&gt;If you want to discuss it more through Skype i am fotismark1</description>
      <pubDate>Fri, 26 Oct 2018 10:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3733552#M9427</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-26T10:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3733554#M9428</link>
      <description>Also I don't really understand why you went with this expensive solution. A Dialed up VPN to access the office resources would do with Forticlient &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Fri, 26 Oct 2018 10:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3733554#M9428</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-26T10:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734161#M9429</link>
      <description>&lt;P&gt;im really appreciate your great help and support , my question is need to configure the static ip address on ASA have a connectivity between my network and this static ip as it already paid for the service and activated from isp company&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i tried to ping this ip but no hope unless configure it , can u give me an example for configure that 1st&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ill check the connectivity with HO server after that if not that mean we need to configure the asa from scratch as u said&lt;/P&gt;
&lt;P&gt;because they told me already tunnel created and no need to configure something from ur side&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so im need my network to be reachable with my static ip 1st&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so how ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also where technically should be assign this ip static ( is it on the isp router interface ) which directly connected to my asa or should i assigned this ip to my outside interface with directly connected to isp router ?&lt;/P&gt;</description>
      <pubDate>Sat, 27 Oct 2018 11:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734161#M9429</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-27T11:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734689#M9430</link>
      <description>&lt;P&gt;im really appreciate your great help and support , my question is need to configure the static ip address on ASA have a connectivity between my network and this static ip as it already paid for the service and activated from isp company&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i tried to ping this ip but no hope unless configure it , can u give me an example for configure that 1st&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ill check the connectivity with HO server after that if not that mean we need to configure the asa from scratch as u said&lt;/P&gt;
&lt;P&gt;because they told me already tunnel created and no need to configure something from ur side&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so im need my network to be reachable with my static ip 1st&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so how ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also where technically should be assign this ip static ( is it on the isp router interface ) which directly connected to my asa or should i assigned this ip to my outside interface with directly connected to isp router ?&lt;/P&gt;
&lt;DIV class="UserSignature lia-message-signature"&gt;amr alrazzaz&lt;/DIV&gt;</description>
      <pubDate>Mon, 29 Oct 2018 08:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734689#M9430</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-29T08:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734705#M9431</link>
      <description>Assign this IP to the interface that is connected to the ISP. &lt;BR /&gt;If for example on ASA Gi0/0 ---------- ISP  &lt;BR /&gt;And your ISP gave you for example 62.2.170.128/29 then with the Cisco Logic on mind, you put the first IP on the Gi0/0&lt;BR /&gt;&lt;BR /&gt;Interface gi0/0&lt;BR /&gt;ip address 62.2.170.129 255.255.255.248&lt;BR /&gt;nameif outside&lt;BR /&gt;Security-level 0&lt;BR /&gt;no shut&lt;BR /&gt;exit&lt;BR /&gt;&lt;BR /&gt;And then you have to tell the router where is the Default Route&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 62.2.170.130   (the next IP would be the providers)&lt;BR /&gt;&lt;BR /&gt;Then off course you have to build your inside LAN network and also NAT the traffic. (split-tunneling) if you have to. &lt;BR /&gt;</description>
      <pubDate>Mon, 29 Oct 2018 09:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734705#M9431</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-29T09:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734774#M9432</link>
      <description>&lt;P&gt;thanks a lot for your great help&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes of course my network already configured and working live with users now but the static ip address we ordered it for vpn connectivity recently after we made our configurations&amp;nbsp; so what is pending is to configure the static ip address on our network to be reachable&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so your configuration that you sent to me is the only pending to my network for static ip to be recognized on it&lt;/P&gt;
&lt;P&gt;correct me if im wrong&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 11:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734774#M9432</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-29T11:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734811#M9433</link>
      <description>&lt;P&gt;just wanna ask about the the outside default route on&amp;nbsp; asa because i dont have a router , i have core switch only connected to ASA which directly connected to isp router&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so the configuration of default route on asa will be :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Route outside 0.0.0.0 0.0.0.0 next hope ip address (ip of the wan interface of isp router which assign on it the static ip ?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is it correct ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;\&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 12:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734811#M9433</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-29T12:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734849#M9434</link>
      <description>&lt;P&gt;What do you mean Core Switch? Layer 3 Switch? do you have Routed Vlans? &lt;/P&gt;
&lt;P&gt;So you have connected the ISP side to the Switch? So if its a Layer 3 Switch are you going to assign that IP on the Switch? I don't understand...&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 12:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734849#M9434</guid>
      <dc:creator>Fotiosmark</dc:creator>
      <dc:date>2018-10-29T12:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: vpn site to site between FIREWALLS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734966#M9435</link>
      <description>&lt;P&gt;this is a layer 2 switch only but vlans creations - dhcp servers for each vlan with management ip addresses&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so its only layer 2 switch not more , so in that case whats the answer of my question &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks many thanks&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-to-site-between-firewalls/m-p/3734966#M9435</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2018-10-29T14:43:15Z</dc:date>
    </item>
  </channel>
</rss>

