We’re in the process of migrating our legacy VPN concentrators over to a pair of ASA5540s. The VPN connections we use today are L2L, RA, & easy VPN. I don’t want to jump up to 8.3 or higher just yet, due to the differences in the NAT, group-objects and ACL policies.
Would it be recommended to use an 8.2 code as standard for VPN endpoints?
Last year I did what you are trying to do, I migrated from a pair of Cisco 3060 concentrators to a pair of Cisco ASA 5540 firewalls. I went right to 8.3 since I had to manually port the config over anyways. If you don't want to go to 8.3 just go to 8.2x and then upgrade when your ready. I wanted 8.3 because at the same time I migrated clients from IPSec VPN to Anyconnect and wanted some of the features
I'm with vabruno on this. If you're moving onto ASA fresh from a different platform then the current version (8.4(3)) is the way to go. The new syntax will be used going forward and new features - especially advanced remote access (AnyConnect), Identity Firewall, etc - are all on the newer code.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...