We have Site-To-SIte VPN (provisioned on both ASA HA active/standby on each site) between our HQ and one remote branch site. In two weeks time, we will close that branch and commission the ASA HA firewall on that site. My question is there any particular (best practice) steps that I need to take in considerations with regard the existing configuration of site-2-site VPN on the HQ's ASA firewall?
There would normally be a crypto map (which refers to an ACL defining interesting traffic), a NAT exemption rule and a definition for the peer. You should remove all of those configuration components on the HQ ASA.
Be sure to take a backup before and after to ensure you have a known good configuration to revert to in the event that you inadvertently remove something you shouldn't have. You can also compare them side by side (use something like examdiff) to confirm your work.
More people are working remotely, and this increases the risk of security breaches and the difficulty in defending remote workers where they work and securing the devices they use.
Learn about Cisco Remote Secure Worker solutions that verify workers, secu...
ISE Node Terminology
Policy Administration Node
Monitoring & Troubleshooting Node
Policy Services Node
Platform Exchange Grid Node
The single plane of glass for ISE administration and configuration operatio...
On December 8, FireEye reported that it had been compromised in a sophisticated supply chain attack: more specifically through the SolarWinds Orion IT monitoring and management software. The attackers leveraged business software updates in order to distr...
About this Document
Cisco Secure Endpoint (formerly AMP for Endpoints) is a comprehensive Endpoint Security solution designed to function both as a stand-alone tool, and as a part of the architecture of natively integrated Cisco and 3rd par...