<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to site vpn issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151770#M959611</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will do that &lt;/P&gt;&lt;P&gt;Thnx a lot sir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 26 Jan 2009 22:04:50 GMT</pubDate>
    <dc:creator>dbellamkonda</dc:creator>
    <dc:date>2009-01-26T22:04:50Z</dc:date>
    <item>
      <title>Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151762#M959603</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have ASA 5540 at our main office and we established a site to site vpn with several small offices( small offices have pix 506 and asa 5505)  at different places which are connected through cable modems and cable modems pull dynamic ips from cmts.On few of the firewalls at office we assigned a static because when ever cable modem pulls a new ip... we need to change the ip on main ASA 5540 in our office to bring the tunnel up . Is there any other way through which ASA learns the ip by itself and we dont need to manually change the IP on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much in advance&lt;/P&gt;&lt;P&gt;Kindly help me through this &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:14:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151762#M959603</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2020-02-21T11:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151763#M959604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you try  dynamic to static L2Ls, dynamic side will always have to be the initiator.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805733df.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805733df.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jan 2009 19:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151763#M959604</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-01-22T19:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151764#M959605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much for the doc.&lt;/P&gt;&lt;P&gt;We already have configs in place for both the firewalls ,, i noticed this .isakmp key ******** address 0.0.0.0 netmask 0.0.0.0... &lt;/P&gt;&lt;P&gt;would thiis all we need &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can help me how to do it ,,,with commands tht wld be gr8 ,, thnx a lot &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Jan 2009 15:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151764#M959605</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2009-01-23T15:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151765#M959606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Davi, Im sorry I did not see your second reply.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the PIXs  meaning the remote sites that have dynamic DHCP in their outside interfaces you need to configure them as regular L2L and specify the Peer address which is the HQ ASA applience that do have static for the outside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assume HQ ASA oustide interface is 20.20.20.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for the pix side would be something similar to : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp key &amp;lt;******&amp;gt;  address 20.20.20.1 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the HQ side the crypto map type would be dynamic-map  as seen in the example link for LION HQ firewall that is the static side,  and the pre-share key you  can use the default tunnel group the asa already have &lt;B&gt;DefaultL2LGroup&lt;/B&gt; that pre-share key will be used for remote sites to authenticate&lt;/P&gt;&lt;P&gt;the tunnel,  PLS try attempting to configure it, pay also attention to the nat exempt access-list 100 seen in the example  to  permit source and destination networks  and apply the access list in nat statement&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100 , and make sure transform sets are identical at both ends . Again make an attempt to configure the tunnel with your first remote site and have that remote side initiate traffic to bring up the tunnel, if tunnel does not come up come back to help you out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I quote from the link above .&lt;/P&gt;&lt;P&gt;This would be the HQ side  for dynamic settings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map cisco 1 set transform-set myset &lt;/P&gt;&lt;P&gt;crypto map dyn-map 20 ipsec-isakmp dynamic cisco &lt;/P&gt;&lt;P&gt;crypto map dyn-map interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;   pre-shared-key * &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Jan 2009 03:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151765#M959606</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-01-25T03:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151766#M959607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much for your help sir.&lt;/P&gt;&lt;P&gt;Will configure it the way u suggested.&lt;/P&gt;&lt;P&gt;Much appreciated. Than a lot again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 13:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151766#M959607</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2009-01-26T13:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151767#M959608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem, PLS let me know the progress,  I would suggest starting with the PIX506 site first which will be mush easy.  When the PIX side initiate the tunnel and there is not connection issue at remote site PIX or HQ site ASA  show crypto isakmp sa, if you see &lt;B&gt;QM_IDLE&lt;/B&gt; tunnel would be up  but if source hosts cannot connect to dest hosts in HQ we will take a look at the nonat access-lists at both ends. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX506LAB#&lt;B&gt;show crypto isakmp sa&lt;/B&gt;&lt;/P&gt;&lt;P&gt;Total     : 1&lt;/P&gt;&lt;P&gt;Embryonic : 0&lt;/P&gt;&lt;P&gt;        dst               src        state     pending     created&lt;/P&gt;&lt;P&gt;    63.x.x.x      68.x.x.xx    QM_IDLE         0           1&lt;/P&gt;&lt;P&gt;PIX506ELAB#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 18:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151767#M959608</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-01-26T18:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151768#M959609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much for your help.&lt;/P&gt;&lt;P&gt;Our managers want us to test this with the equipment we have and show them the results  first before we put this into the production network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will keep you updated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would the tunnel come up by itself even after the pix at office pulls another Ip or after it pulls another ip do we have to clear ipsec and isakmp sessions to bring tunnel up ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank youy so much again for your time and patience&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 19:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151768#M959609</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2009-01-26T19:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151769#M959610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;Would the tunnel come up by itself even after the pix at office pulls another Ip or after it pulls another ip do we have to clear ipsec and isakmp sessions to bring tunnel up ?&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this would happen   on the PIX side then you need to send interesting traffic from the remote side to bring up the tunnel backup , interesting traffic could be a PING or RDP that generates traffic that will go through the tunnel,  remember the HQ is dynamic and will accept the connection on a new IP from the DHCP side as long secret keys or any other config pertaining to the IPsec policy  is NOT changed at either end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually on the  dynamic DHCP side may pick a new IP if pix is rebooted or the lease time the ISP provider has it set for certain time/dates. If Im not mistaken DHCP leases last quite a while but all depends on ISPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;keep us posted and pleasure to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 20:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151769#M959610</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-01-26T20:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site vpn issue</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151770#M959611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will do that &lt;/P&gt;&lt;P&gt;Thnx a lot sir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 22:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue/m-p/1151770#M959611</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2009-01-26T22:04:50Z</dc:date>
    </item>
  </channel>
</rss>

