A vendor is trying to set up a site to site to site VPN connection from their network to a internal router on our network. They have a juniper router on each side with our ASA in between. I have set up a public IP that is natted to the ip address of the Juniper device inside our network. I've also set up an ACL allowing the two public IP's they will be coming from and allowing UDP 500, 4500 TCP 22 and ESP. They are unable to get the tunnel to come up and I believe it may have to do with NAT traversal but not sure what I need to do to enable the traffic to passthrough. I've also tried it without the ACL and with an ACL that allows Any, just for testing. Our ASA is a 5515-X.
To me, it looks like you did all the work on the ASA. As long the NAT is correctly configured, there shouldn't be an issue. Did the vendor check the logs on Juniper? You can also do a packet capture on the ASA interface facing internal-router and provide to the vendor.
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to leverage Microsoft Single Sign-On for multiple ISE Portals (for example Sponsor and Guest/BYOD Portals).
At the time of this writing, ISE cann...
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to create a BYOD Flow to provide Wireless network access using an employee’s Azure AD credentials.
The use of Azure AD credentials is an alterna...
The table below shows the whole Cisco Security solutions + Splunk integrations add-ons. Kindly let me know if I have missed some add-ons or if there are any new updates. Thank you!
Hope this will be helpful for everyone who is looking for Splunk in...
A python based script to generate report if there are disabled rules under an Access Control Policy and an option to delete those rules in bulk.
Step 1 Download the script on PCStep 2 Make sure python3 is installed on PC and have reach...