02-05-2011 05:18 PM
I would like to use DNS names in the group name, but are unable to, does somebody have a way of use DNS name in the group name in L2L tunnels on a ASA.
Thank you for your help
Sent from Cisco Technical Support iPhone App
Solved! Go to Solution.
02-06-2011 04:53 PM
Resolving the ip address via dns of a statically configured fqdn of an IPsec identity should be no problem.
I've never done exactly that, In such cases I used a quick and dirty "ip host" entry respecively a "name" on the ASA, I have more trust in the config than in an axternal dns server.
For your dynamically adressed 2811s you will quite surely need "Eazy VPN Remote".
Rgds, MiKa
02-05-2011 11:29 PM
Hi,
I understand you are configuring your ASA for site to site IPSec. You want to know if you can use the fully qualified domain name (FQDN) instead of the IP address for the crypto map set peer command.
You can use the following:-
crypto map outside_map 40 set peer hostname.domain.com
Please make sure you have this command as well:
crypto isakmp identity hostname
In the tunnel-group, use the hostname.domain.name as well instead of the IP address:
tunnel-group hostname.domain.name type ipsec-l2l
I hope it helps.
Thanks,
Shilpa
02-06-2011 04:30 AM
Will the hostname be resolved by DNS then?
What I have is VPN tunnels to routers from the ASA that does not have static ip addresses , so I will need the hostnames on the ASA the look at DNS when the ip address changes on the remote routers.
Thank you for your help
Sent from Cisco Technical Support iPhone App
02-06-2011 01:53 PM
Hi Peter,
dynamic resolving of domain names at runtime is typically not supported (at least not for the majority of configurations)
what typically will happen is that any fqdn entered in the config (where permitted and interpreted by config as a fqdn) will be translated at the time of the configuration to an ip address.
if you want to establish tunnels from routers with dynamic IP addresses to a statically configured ASA the standard approach and recommended configuration is to use "eazy VPN remote" on the router and "eazy VPN server" on the ASA (also known as hardware client or similar).
In that case the ASA cannot establish a tunnel to routers with dynamic IP addresses, the routers will have to establish the tunnel.
I hope you can find the eazy VPN configuration samples on cisco.com, if not, I will be happy to assist in searching (using a search engine)
Best regards,
MiKa
PS [addendum]: The IPsec identity and therefore the tunnel-group name will be the eazy VPN group name instead of IP address or fqdn. If the ISAKMP authenication method is "pre shared" (or "group password") the IKE/ISAKMP will use aggressive mode for phase one. If rsa-sig is used on IKE/ISAKMP the main mode can be used for phase one. (It's quite different for IKEv2 - but I assume you have the traditional config with "crypto isakmp policy" etc...)
02-06-2011 04:16 PM
Will I be able to use dns resolve in a statically ip router at the main site?
Sent from Cisco Technical Support iPhone App
02-06-2011 04:53 PM
Resolving the ip address via dns of a statically configured fqdn of an IPsec identity should be no problem.
I've never done exactly that, In such cases I used a quick and dirty "ip host" entry respecively a "name" on the ASA, I have more trust in the config than in an axternal dns server.
For your dynamically adressed 2811s you will quite surely need "Eazy VPN Remote".
Rgds, MiKa
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide