?
Solved

PIX vpn changes site to site

Posted on 2009-07-08
3
Medium Priority
?
260 Views
Last Modified: 2012-05-07
I made changes to the vpn key and need to apply the changes to the interface no crypto map outside_map interface outside
no isakmp enable outside
crypto map outside_map interface outside
isakmp enable outside
I also have other site to sites up and running if i do this will it bring down all tunnels?
0
Comment
Question by:Firstcorp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 1000 total points
ID: 24810202
> if i do this will it bring down all tunnels?
Absolutely. Removing the crypto map from the interface drops all tunnels immediately.
Adding back in right away, most tunnels will re-establish immediately and almost nobody will even notice.
0
 
LVL 7

Assisted Solution

by:geergon
geergon earned 1000 total points
ID: 24810351
But if you are using version 6.3(4) and UP, you can do any changes to the VPN without disabling the crypto map applied in the interface. Otherwise you will stuck your firewall.

But there is some special cases where you need to turn off the crypto map service and start it again, when you do changes. I mean no crypto map and no isakmp and then crypto map and  isakmp
0
 

Author Comment

by:Firstcorp
ID: 24815201
I had a vpn setup in this pix, the remote site changed IP addresses and key. I changed
(config)# tunnel-group <peer IP> ipsec-attributes
pre-shared-key <new key>
transform-set  
isakmp policy 40 encryption aes-256
isakmp policy 40 hash md5
access-list outside_cryptomap_40 extended permit ip 192.168.233.0 255.255.255.0 172.16.0.0 255.255.0.0
What else should i check/change?
Now I can not get the tunnel up, this is pix V7.0 to checkpoint, i had this working with a test pix.
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
You deserve ‘straight talk’ from your cloud provider about your risk, your costs, security, uptime and the processes that are in place to protect your mission-critical applications.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question