Solved

PIX vpn changes site to site

Posted on 2009-07-08
3
259 Views
Last Modified: 2012-05-07
I made changes to the vpn key and need to apply the changes to the interface no crypto map outside_map interface outside
no isakmp enable outside
crypto map outside_map interface outside
isakmp enable outside
I also have other site to sites up and running if i do this will it bring down all tunnels?
0
Comment
Question by:Firstcorp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 24810202
> if i do this will it bring down all tunnels?
Absolutely. Removing the crypto map from the interface drops all tunnels immediately.
Adding back in right away, most tunnels will re-establish immediately and almost nobody will even notice.
0
 
LVL 7

Assisted Solution

by:geergon
geergon earned 250 total points
ID: 24810351
But if you are using version 6.3(4) and UP, you can do any changes to the VPN without disabling the crypto map applied in the interface. Otherwise you will stuck your firewall.

But there is some special cases where you need to turn off the crypto map service and start it again, when you do changes. I mean no crypto map and no isakmp and then crypto map and  isakmp
0
 

Author Comment

by:Firstcorp
ID: 24815201
I had a vpn setup in this pix, the remote site changed IP addresses and key. I changed
(config)# tunnel-group <peer IP> ipsec-attributes
pre-shared-key <new key>
transform-set  
isakmp policy 40 encryption aes-256
isakmp policy 40 hash md5
access-list outside_cryptomap_40 extended permit ip 192.168.233.0 255.255.255.0 172.16.0.0 255.255.0.0
What else should i check/change?
Now I can not get the tunnel up, this is pix V7.0 to checkpoint, i had this working with a test pix.
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This past year has been one of great growth and performance for OnPage. We have added many features and integrations to the product, making 2016 an awesome year. We see these steps forward as the basis for future growth.
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question