<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to add multiple tunnel to an existing L2L in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369369#M969433</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have Tx end tech check the configs. Try debug icmps and see where the replies dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Dec 2009 21:33:34 GMT</pubDate>
    <dc:creator>mvsheik123</dc:creator>
    <dc:date>2009-12-10T21:33:34Z</dc:date>
    <item>
      <title>How to add multiple tunnel to an existing L2L</title>
      <link>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369363#M969427</link>
      <description>&lt;P&gt;I was able to built tunnel between L2L fallowing this example:&lt;SPAN style="font-size: 10pt;"&gt;"Add a New Tunnel or Remote Access to an Existing L2L VPN"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I've tried to add other tunnel to the NY (HQ) Firewall. Is it possible to add more tunnel ?&lt;/P&gt;&lt;P&gt;My configuration is TN, NY, and CA tunneled between each other. Everyone have access to each other network. We've setup a new tunnel to access TX through NY but only TN and NY can access TX. I can't access TX from CA. Are there any restriction in the number of tunnel on NY.&lt;/P&gt;&lt;P&gt;NY is a Cisco ASA 5510&lt;/P&gt;&lt;P&gt;TN is a Cisco PIX 515&lt;/P&gt;&lt;P&gt;CA is a Cisco ASA 5510&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369363#M969427</guid>
      <dc:creator>martin.loiselle</dc:creator>
      <dc:date>2020-02-21T11:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to add multiple tunnel to an existing L2L</title>
      <link>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369364#M969428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5510 with Sec+ license will suppprt upto 250vpn peers. Looks like your issue relates to more of configuration (ex:hairpin ACLs/routes)&amp;gt; please post the sanitized configs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 15:34:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369364#M969428</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2009-12-10T15:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to add multiple tunnel to an existing L2L</title>
      <link>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369365#M969429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Let say this is the NY firewall:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.20.x 255.255.255.0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 10.10.20.0 255.255.255.0 10.10.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 10.10.20.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 10.29.68.0 255.255.255.0 10.10.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 10.10.50.0 255.255.255.0 10.29.68.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 10.10.20.0 255.255.255.0 10.29.68.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 10.29.68.0 255.255.255.0 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 10.29.68.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 192.168.1.0 255.255.255.0 10.29.68.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_no-nat extended permit ip 10.10.20.0 255.255.255.0 172.16.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;access-list vpn_CA extended permit ip 10.10.20.0 255.255.255.0 10.10.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_CA extended permit ip 10.29.68.0 255.255.255.0&amp;nbsp; 10.10.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;access-list vpn_TN extended permit ip 10.10.20.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_TN extended permit ip 10.29.68.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;access-list vpn_TX extended permit ip 10.10.20.0 255.255.255.0 10.29.68.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_TX extended permit ip 10.10.50.0 255.255.255.0 10.29.68.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_TX extended permit ip 192.168.1.0 255.255.255.0 10.29.68.0 255.255.255.0&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list vpn_no-nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;access-group acl-out in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;sysopt connection preserve-vpn-flows&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;crypto map medrium_vpns interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt;===========================================================&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 16:26:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369365#M969429</guid>
      <dc:creator>martin.loiselle</dc:creator>
      <dc:date>2009-12-10T16:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to add multiple tunnel to an existing L2L</title>
      <link>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369366#M969430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;ACL statements looks correct on NY end. do you have config for tx end?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Also, here are my 2 cents.. you may not need all those 'nonat' statements for spoke-spoke subnets. The traffic not originated from NY end (inside).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;ex: access-list vpn_no-nat extended permit ip 10.29.68.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;hth&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;MS&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 16:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369366#M969430</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2009-12-10T16:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to add multiple tunnel to an existing L2L</title>
      <link>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369367#M969431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;This is CA firewall: (the one that is not able to talk to TX)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; access-list vpn_no-nat extended permit ip 10.10.50.0 255.255.255.0 10.10.20.0 255.255.255.0&lt;BR /&gt; access-list vpn_no-nat extended permit ip 10.10.50.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt; access-list vpn_no-nat extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt; access-list vpn_no-nat extended permit ip 10.10.50.0 255.255.255.0 192.168.11.0 255.255.255.0&lt;BR /&gt; access-list vpn_no-nat extended permit ip 10.29.68.0 255.255.255.0 10.10.50.0 255.255.255.0&lt;BR /&gt; access-list vpn_no-nat extended permit ip 10.10.50.0 255.255.255.0 10.29.68.0 255.255.255.0&lt;BR /&gt; &lt;BR /&gt; access-list vpn_NY extended permit ip 10.10.50.0 255.255.255.0 10.10.20.0 255.255.255.0&lt;BR /&gt; access-list vpn_NY extended permit ip 10.10.50.0 255.255.255.0 10.29.68.0 255.255.255.0&lt;BR /&gt; &lt;BR /&gt; access-list vpn_TN extended permit ip 10.10.50.0 255.255.255.0 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list vpn_no-nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group acl-out in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 10.10.50.1 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 17:17:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369367#M969431</guid>
      <dc:creator>martin.loiselle</dc:creator>
      <dc:date>2009-12-10T17:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to add multiple tunnel to an existing L2L</title>
      <link>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369368#M969432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, i can't have TX configuration since i don't manage that one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 18:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369368#M969432</guid>
      <dc:creator>martin.loiselle</dc:creator>
      <dc:date>2009-12-10T18:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to add multiple tunnel to an existing L2L</title>
      <link>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369369#M969433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have Tx end tech check the configs. Try debug icmps and see where the replies dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 21:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-add-multiple-tunnel-to-an-existing-l2l/m-p/1369369#M969433</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2009-12-10T21:33:34Z</dc:date>
    </item>
  </channel>
</rss>

