02-03-2015 08:39 AM
Hello,
Current:
I have an ASA 5505 (8.2.x) deployed at a customer's site with a public ip provided by customer.
I have a site-to-site tunnel between us (site A) and customer (site B).
ASA (at customer site) was setup with 2 default vlans (one for outside, one for inside using ports 2-7).
Future:
Customer wants another site-to-site tunnel for a separate project, but they want to use the same ASA but use a different port configured for a different ip scheme for this new project. (which means same public ip, but different vlan for ip).
My Actions:
A) My first reaction was that i could not do this, but since this is the customer and i have to figure out a way, Can i reconfigure customer (site B) ASA to take one port and configure it for a different vlan (using the ip scheme for this project) and setup a second site-to-site tunnel using that vlan?
B) Can i even reconfigure a port for a third vlan on that ASA? (customer ASA 5505, 8.2.x, generic 10 seat license).
Whats the best approach to accomplish this task?
thanks..
Solved! Go to Solution.
02-04-2015 10:05 AM
That's an odd question -- technically you could -- I think where you're going to fall short is that he is using the same peer address on his end. I don't think it's going to end up working favorably...never tried this.
I don't really understand the need for 'another site-to-site tunnel' though. Theoretically, I could be wrong here, there is only need for one IKE phase 1 tunnel. There can be multiple IKE phase 2 tunnels communicating through that tunnel at the same time though.
Why not leave the peer relationship as it is, expand your (and his) internal/external cryptos, and go from there. ASA 8.4 supports twice nat -- which could be a solution if he's having issues on his end.
And to be honest, even the ASA 5505's that I've helped configure have all been on the remote side, and I'm pretty sure that every single one of them existed solely for the purposes of a single site to site to my organization.
Maybe explain WHY he wants to do what he wants to do also?
02-05-2015 06:10 AM
There are several things that we do not know which could impact the answer to the question.
The ASA5505 should certainly support two site to site tunnels, as long as the tunnels go to different destinations. Two tunnels from the same 5505 to the same destination peer would not work. So does the customer intend the second tunnel to terminate on a different device?
Where you may have more problem is in the extra vlan on the 5505. The 5505 restricts vlans on the 5505. It supports full functionality on two vlans and allows a third vlan as DMZ but imposes some restrictions on it. So depending on what the customer wants to do with the third vlan it might work or it might not work.
HTH
Rick
02-04-2015 10:05 AM
That's an odd question -- technically you could -- I think where you're going to fall short is that he is using the same peer address on his end. I don't think it's going to end up working favorably...never tried this.
I don't really understand the need for 'another site-to-site tunnel' though. Theoretically, I could be wrong here, there is only need for one IKE phase 1 tunnel. There can be multiple IKE phase 2 tunnels communicating through that tunnel at the same time though.
Why not leave the peer relationship as it is, expand your (and his) internal/external cryptos, and go from there. ASA 8.4 supports twice nat -- which could be a solution if he's having issues on his end.
And to be honest, even the ASA 5505's that I've helped configure have all been on the remote side, and I'm pretty sure that every single one of them existed solely for the purposes of a single site to site to my organization.
Maybe explain WHY he wants to do what he wants to do also?
02-05-2015 06:10 AM
There are several things that we do not know which could impact the answer to the question.
The ASA5505 should certainly support two site to site tunnels, as long as the tunnels go to different destinations. Two tunnels from the same 5505 to the same destination peer would not work. So does the customer intend the second tunnel to terminate on a different device?
Where you may have more problem is in the extra vlan on the 5505. The 5505 restricts vlans on the 5505. It supports full functionality on two vlans and allows a third vlan as DMZ but imposes some restrictions on it. So depending on what the customer wants to do with the third vlan it might work or it might not work.
HTH
Rick
02-05-2015 07:14 AM
I resolved this issue by taking one of the ports on ASA and placing it into a separate vlan. Assigned it an ip range that customer wanted and updated my tunnel phase 2 crypto to reflect the new subnet on both ends.
Thank you both for your insight and assistance.
02-05-2015 08:21 AM
I am glad that you have resolved your issue and that our responses were helpful in that. Thank you for using the rating system to mark this question as answered. This helps other readers in the forum to identify threads that have helpful information.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide