I using VPN concentrator for remote access VPN and ASA 5520 for Site to site VPN tunnel, remote access and AnyConnect VPN.
I need to scrap the VPN concentrator and use the outside interface IP address of the VPN concetrator to the ASA without distrubing the ASA outside interface setup. Will it be possible to use the VPN load balancing in ASA ??
Are you saying you are now going to have an ASA load-balanced cluster when you scrap the "concentrator" (vpn3k??) ?
If the VPN Concentrator's Public Intf is on the same network as the ASA's Outside Intf then I dont see any issue with using the VPN Concentrators Public IP as the Cluster IP address on the ASA.. Devices that terminate to the IP assigned to the physical interface should still be reachable - they are on my LB Clusters.
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
This document presents the ISE data limiting best practices that can dramatically improve the system performance on ISE.
Your deployment may be impacted if the alarms tab on ISE shows High load average, high CPU or high memoy usage alarm...