<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migrating Site-Site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863076#M955819</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you will need a different isakmp key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean take it down or make sure it can't be used again ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take down &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear crypto ipsec sa peer x.x.x.x &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To ensure it can't be used again remove config or at very least the isakmp key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Feb 2008 12:13:26 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2008-02-01T12:13:26Z</dc:date>
    <item>
      <title>Migrating Site-Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863071#M955811</link>
      <description>&lt;P&gt;I currently have a site-site VPN (VPN1) betwween a Cisco Pix 506E and an ASA 5510 in HK and Leeds respectively. I need to move the IPsec tunnel to another internet gateway (10 Mb) in Leeds to which is connected a Cisco Pix 506E. To make any changes to the PIX 506E in HK, I will need to connect to it accross the current VPN tunnel (VPN1). I run the risk of loosing connectivity to HK if changes are made to the VPN1 configuration in HK. How do I work around this ? Can I create a second VPN tunnel (VPN2) and then shutdown VPN1 when the new VPN is up and running?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:57:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863071#M955811</guid>
      <dc:creator>dasgill</dc:creator>
      <dc:date>2019-03-11T11:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Site-Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863072#M955812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that is exactly what you should do. Are you comfortable with doing it on the HK device ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2008 08:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863072#M955812</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-02-01T08:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Site-Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863073#M955813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am comfortable creating the tunnel on the HK device. I am assuming everything should be fine as long as the isakmp poliy number, transformset and crytomap names are different on for the 2 tunnel configurations on the HK device. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2008 10:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863073#M955813</guid>
      <dc:creator>dasgill</dc:creator>
      <dc:date>2008-02-01T10:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Site-Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863074#M955815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Isakmp policy number is not tied to the peer ip address so you can use the same one for both connections, unless you are actually changing something within the ISAKMP policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same goes for the transform-set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The crypto map name will not be different because you can only apply one crypto map name to an interface. Just use a different index number. So if your existing crypto map looks like &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpnset 1 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map vpnset 1 set peer x.x.x.x&lt;/P&gt;&lt;P&gt;crypto map vpnset 1 match address "acl"&lt;/P&gt;&lt;P&gt;etc..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for the new VPN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpnset 2 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map vpnset 2 set peer x.x.x.x&lt;/P&gt;&lt;P&gt;etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assuming of course you aren't already using index number 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2008 10:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863074#M955815</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-02-01T10:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Site-Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863075#M955817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much. As far as isakmp is concerned I will need to add a different key for the second tunnel:&lt;/P&gt;&lt;P&gt;isakmp key ***** address &lt;IP address="" pix="" 2=""&gt; netmask 255.255.255.255.&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;Cryto map: change index number.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I take tumnnel VPN1 down once VPN2 is up and running.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2008 11:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863075#M955817</guid>
      <dc:creator>dasgill</dc:creator>
      <dc:date>2008-02-01T11:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Site-Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863076#M955819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you will need a different isakmp key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean take it down or make sure it can't be used again ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take down &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear crypto ipsec sa peer x.x.x.x &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To ensure it can't be used again remove config or at very least the isakmp key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2008 12:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863076#M955819</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-02-01T12:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Site-Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863077#M955820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2008 12:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863077#M955820</guid>
      <dc:creator>dasgill</dc:creator>
      <dc:date>2008-02-01T12:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Site-Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863078#M955821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have configured both firewalls as advised by Jon but I am geeting some errors when attempting to pass interesting traffic. I attach the errors and the configs for the 2 PIx's below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb 04 15:06:42 [IKEv1]: QM FSM error (P2 struct &amp;amp;0x1b24150, mess id 0x47595d7)!&lt;/P&gt;&lt;P&gt;Feb 04 15:06:42 [IKEv1]: Group = 192.168.0.1, IP = 192.168.0.1, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;Feb 04 15:06:42 [IKEv1]: QM FSM error (P2 struct &amp;amp;0x1b24860, mess id 0x9cafcd4d)!&lt;/P&gt;&lt;P&gt;Feb 04 15:06:42 [IKEv1]: Group = 192.168.0.1, IP = 192.168.0.1, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;sh Feb 04 15:06:47 [IKEv1]: QM FSM error (P2 struct &amp;amp;0x1d085d0, mess id 0x458d4091)!&lt;/P&gt;&lt;P&gt;Feb 04 15:06:47 [IKEv1]: Group = 192.168.0.1, IP = 192.168.0.1, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh crypto isakmp sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   Active SA: 1&lt;/P&gt;&lt;P&gt;    Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;/P&gt;&lt;P&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1   IKE Peer: 192.168.0.1&lt;/P&gt;&lt;P&gt;    Type    : L2L             Role    : initiator &lt;/P&gt;&lt;P&gt;    Rekey   : no              State   : MM_ACTIVE &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX 1 (192.168.0.3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ford esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto map VPNHK 2 match address outside_crypto_acl&lt;/P&gt;&lt;P&gt;crypto map VPNHK 2 set peer 192.168.0.1&lt;/P&gt;&lt;P&gt;crypto map VPNHK 2 set transform-set ford&lt;/P&gt;&lt;P&gt;crypto map VPNHK interface outside&lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 1000&lt;/P&gt;&lt;P&gt;isakmp am-disable&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;tunnel-group 192.168.0.1 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 192.168.0.1 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key ev0lut10n&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX 2 (192.168.0.1)&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set chevvie esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto map transam 1 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map transam 1 match address 101&lt;/P&gt;&lt;P&gt;crypto map transam 1 set peer 192.168.0.2&lt;/P&gt;&lt;P&gt;crypto map transam 1 set transform-set chevvie&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map transam 2 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map transam 2 match address 101&lt;/P&gt;&lt;P&gt;crypto map transam 2 set peer 192.168.0.3&lt;/P&gt;&lt;P&gt;crypto map transam 2 set transform-set chevvie&lt;/P&gt;&lt;P&gt;crypto map transam interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ichabod address 192.168.0.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp key ev0lut10n address 192.168.0.3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 1000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2008 15:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-site-site-vpn/m-p/863078#M955821</guid>
      <dc:creator>dasgill</dc:creator>
      <dc:date>2008-02-04T15:17:31Z</dc:date>
    </item>
  </channel>
</rss>

