10-07-2008 02:01 PM
Migrating from 7206VXR to ASA5550.
The following crypto statement works on the VXR router but is not accepted by the ASA. It allows me to enter just 0.0.0.0 but then says I can only setup L2L in aggresive mode. Any thoughts on how to allow any address to create a L2L tunnel?
crypto isakmp key **** address 0.0.0.0 0.0.0.0
10-07-2008 07:24 PM
If Im not mistaken crypto isakmp key **** address 0.0.0.0 0.0.0.0 is to allow IOS router to accept dynamic IPsec peer connections in a L2L scenario.
To achive this in ASA you will need to configure Dynamic to static IPsec L2L tunnels between your ASA5550 that has static public IP on outside interface and your peers that are dynamic non-static assigments.
have a look here
L2L between Static ASA/PIX and router Dynamic IP
L2L PIX-to-PIX Static and Dynamic
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805733df.shtml
Rgds
Jorge
10-09-2008 12:15 AM
AFAIR, the ASA will give you an warning message. But if you look at 'show run tunnel-group' you will see this key.
In the ASA 7.x code, the old crypto isakmp key is no longer used. Instead keys are entered under the tunnel group >> ipsec attributes.
Regards
Farrukh
10-09-2008 07:36 AM
Thanks Farrukh,
I ended up using a DMVPN config with the tunnel group statements as you mentioned. It worked like a charm however it only works in aggressive mode which ends up failing our PCI compliance. So it looks like I will have to just write up a compensating controls document to account for it. I appreciate the feedback I received.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide