Can we automatically renegotiate Phase 2 SA so that VPN tunnel stays up even if no traffic?
We have a site-to-site IPSEC VPN with Cisco ASA5520 at our end and a Fortigate firewall at the other end (maintained by a 3rd party company)
To cut a long story short, we want to be able to keep the VPN connection up at all times (i.e. even when there is no “interesting traffic” passing) Is there any means to do this other than e.g. sending a continuous ping across it?
The Fortigate people tell me they have a feature called “autokey keepalive” which would achieve this if they had a Fortigate at each end of the connection (it ensures a new SA is negotiated even if there is no traffic so that the VPN tunnel stays up)
Is there a Cisco equivalent that we could implement at our end? I’ve not heard of anything similar with Cisco – can anyone confirm? And, if no specific feature, is there any workaround to achieve this with Cisco?
Radius server configuration for 802.1X
Server radius test1
Address ipv4 10.1.1.1
Server radius test2
Address ipv4 10.1.1.2
aaa group server radius TEST-gr
server name test1
server name test2
Umbrella’s cloud-delivered firewall (CDFW) is a cool features that provides Firewall Services in the Cisco Umbrella Cloud without the need to deploy on-premises firewall devices and visibility and control for internet traffic across all branch offices. To...
SymptomsDownloadable ACL (dACL) does not take effect on the IOS-XE Network Access DevicesDiagnosisCreating redirection ACL on the IOS-XE device failed to redirect the specified traffic for captive portal redirectionSolutionEnable device tracking, Below is...
Multiple Cisco Security Technologies in a single book : ASA Firepower, WSA, Umbrella, ISE and VPN with 100 percent 100 practical scenarios with 70 Labs to cover important topics of the Cisco SCOR Exam. The best part is ISE with interesting scenarios wi...