Our ASA 5520 was used to terminate VPN clients only. Today I terminated a 2nd ISP connection on another interface and made that the default interface on the firewall.As soon as I did that, VPN connections no longer connected to the original interfac...
I have a 5520 which is currently used only for terminating inbound Cisco VPN IPSEC clientsWe're in the process of bringing in another Internet connection from a different ISP which would be used for generic web-surfing from within the network (no inb...
We're bringing a 10 mb Internet connection into our WAN provider's Data Ctr. A firewall will sit on the Internet edge, of course, but we require a low-port-density layer 3 device to sit on the inside and route to our coporate WAN (static routing is s...
Equip: 3660, NM-2W, VWIC-2MFT-T1(x2), AIM-ATM. Question: Will there be any issues reconfiguring this hardware for MLFR? There's currently a 'mode atm aim 0' command on the T1 controllers which I presume needs to come out, but will doing so allow ...
I'm building up a bunch of 2620's using WIC-1DSU-T1 modules. It looks like I have a bad module and was wondering if an older FT1 CSU/DSU would work in the new routers. The new modules have a hardware code of PQUICC and the older WIC has HD64570. T...
Thankyou for the suggestion.I did add the route but I'm afraid we're failing during the initial ISAKMP negotiation before the 192.168.252.x address is even applied. The firewall log simply shows 'duplicate Phase 1 packet detected' which probably mea...
Thanks.Hopefully the attached config gives enough information. Interface Outside2 is the one I added and set as the default route. It worked fine but the VPN client connections on Outside then stopped negotiating. As you can see, I've set 'Outsid...
Thanks! I see that in addition to 'ATM' there are mode options for CCS & CAS - are one of these necessary or will the default (whatever that might be) suffice? Appreciate the help!