TACACS from Secondary ASA through VPN IPSec tunnel
I have pair of ASAs in Active/Standby HA mode. ASAs have VPN tunnel going out to the data center where ISE (TACACS) servers are. I can use TACACS for the Active unit, but it seems like Standby unit can't get to ISE at all, it just times out. Since all VPN tunnels are built on Active unit, Standby unit tries to route outgoing traffic to it's own Outside interface which goes nowhere and it never makes it to Active unit to send traffic over the VPN tunnel.
The issue is only for outgoing connection from the Secondary unit. Incoming connections (such as SSH, HTTP) work, I added appropriate NAT statement for that.
The purpose of this document is to demonstrate how ISE authenticate / authorize a user that uses a smart card (PIN + Certificate) and password mechanism to login their system. This document describes the components used for this setup, configuration of IS...
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...