Cisco ASA 5520 with 2 Internet Interfaces: VPN Creation Problem
Hi, I have a cisco ASA 5520 firewall that has 2 interfaces connected to internet lets say Internet-1 and Internet-2. The default route is via Internet-1 18.104.22.168
All the VPN's are build up on Internet-1 interface. Now i am trying to migrate one VPN on the Internet-2 interface and its not working.
I have enabled the ISAKMP on Internet-2. interface. static Route to route the VPN remote end IP to the Internet-2 Router. But when i trigger the interesting traffic, i can see the the traffic on my firewall but it is not trigering the VPN buildup on Internet-2 Interface. If i rebuild that vpn on Interface-2, i can see the vpn triggering (attributes exchange etc). Is there any specifiv thing i have to do on my firewall so that the VPN on Internet-2 interface will be triggered? Any trouble shooting steps? Please help me.
Re: Cisco ASA 5520 with 2 Internet Interfaces: VPN Creation Prob
I can think of a few things to double-check:
1. Make sure the crypto map is applied to your Internet-2 interface
2. Double check that the interesting traffic ACL on your end is an exact mirror of the ACL on the remote end.
3. Double check your debug for exactly when the VPN build up is stopping. If it's in phase 1, then check your ISAKMP settings and verifiy you are using matching settings. If it's in phase 2 (IPsec) then double check your crypto map settings.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...