Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi,
I'm not using BGP this is just a simple connection to Azure using VTI (I'm running version 9.9.2(36))
Debugs are showing nothing so Im missing something fundamental?
-=-=-=-=-=Config-=-=-=-=-
#IKE v2 Proposal!crypto ipsec ikev2 ipsec-propos...
I've got, two 5515-X firewalls (in Active/Standby) and two remote sites with ASA5506-X firewalls (connected via site to site IPSEC VPN).
I've deployed the FirePOWER Management Appliance (VMware) version 6.0.0.1 Build 26, I've updated the SFR modules...
Hi,
I can't get this to work and have made a fundamental error? If I run a test authentication on the ASA it is successfull (if the user is in the VPN-Users group or not which is surprising?
Anyway AnyConnect fails to authenticate at all?
Config
...
Hi,I can't find any syntax for removing single certs.show crypto ca certificatesshows all the certificates in the ASA Crypto archive, for all the trust-points (of which there are three). But theres some old and unused certificates in there, I know re...
Hi Steve, thanks for the feedback. I'll get round to writing up how I did it and post the link here later on, for anyone else's benefit.Glad you got fixed in the end! EDIT: Here's how I fixed it: Cisco FTD Site to Site VPN Pete
SpoilerWas this ever resolved I'm seeing the same thing? (FTD1010 to ASA 5525)PWas this ever resolved I'm seeing the same thing? (FTD1010 to ASA 5525)P
As long as the client still trusts the CA then the issued certificates will remain valid, (as long as they are in date, and not on a revoke list). As for when it will be retired - who knows