Cisco Adaptive Security Appliance Software Version 8.3(1)4 Device Manager Version 6.3(1)
The command wouldn't succed since the interface does not have a "nameif" (as suggested by cisco.com). If I do set a "nameif" then the redundant interface will pass untagged packets.
The command is "crypto isakmp enable interface-name"
It would be: crypto isakmp enable Redundant1.251 but
Here is my run conf:
interface GigabitEthernet0/0 description Switch_#1 duplex full no nameif no security-level no ip address ! interface GigabitEthernet0/1 description *** not used *** duplex full shutdown no nameif no security-level no ip address ! interface GigabitEthernet0/2 description Switch_#2 duplex full no nameif no security-level no ip address ! interface GigabitEthernet0/3 description *** not used *** duplex full shutdown no nameif no security-level no ip address
interface Management0/0 description mgt-vlan nameif inside security-level 100 ip address 172.19.24.66 255.255.254.0 management-only ! interface Redundant1 description Switch_#1_#2 member-interface GigabitEthernet0/0 member-interface GigabitEthernet0/2 no nameif no security-level no ip address ! interface Redundant1.251 description vlan251 vlan 251 no nameif security-level 100 ip address "outside_ip" 255.255.255.
No, you shouldn't configure the nameif command on the physical interface if you have subinterfaces under that particular physical interface purely because that trunk interface would not be tagged, hence it is not recommended to configure any interface settings under the physical trunk interface.
We’re excited to announce new capabilities with Secure Endpoint that allow you to simplify your security and maximize your security operations: Unify your security stack and reduce agent fatigue with Cisco Secure Client; harness integrated risk-based vuln...
Listen: https://smarturl.it/CCRS8E47 Follow us: twitter.com/CiscoChampion
Ransomware, fileless malware, and zero-day attacks continue to target organizations around the world. In response, organizations have resorted to deploying a variety of di...
This is a general information page for Cisco Threat Centric (TC-NAC) with ISE
Threat Centric Network Access Control (TC-NAC) feature enables you to create authorization policies based on the threat and vulnerability attributes received from the th...
The 2021 IT Blog Awards, hosted by Cisco, is now open for submissions. Submit your blog, vlog or podcast today. For more information, including category details, the process, past winners and FAQs, check out: https://www.cisco.com/c/en/us/t...
Cisco Secure Endpoint (formerly AMP for Endpoints) will decommission legacy cloud servers, which results in Legacy Windows Connector Versions 3.x/4.x and Mac Connector Version 1.0.x ceasing to ...