Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1332
  • Last Modified:

Site to Site VPN - Cisco ASA 5540 to Sonicwall TZ200

I am have a Cisco ASA 5540 with a static ip (Outside Interface) and Sonicwall TZ200 with a dynamic ip (Outside Interface). The Sonicwall firewall is set to use aggressive mode and I know I will need to mirror the phase configurations. However, any sample configurations would be helpful for the Cisco ASA 5540.

Thanks in advance.
0
SDTownsend
Asked:
SDTownsend
  • 4
  • 2
1 Solution
 
Michael OrtegaSales & Systems EngineerCommented:
dynamic map on your ASA should do the trick.

MO
0
 
Michael OrtegaSales & Systems EngineerCommented:
0
 
SDTownsendAuthor Commented:
Do you have a config sample I can use as a template?
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 
Michael OrtegaSales & Systems EngineerCommented:
Try the link i sent you above. Without your IP information I can't really reproduce a config that actually works, but the URL above has all the information you need to configure you ASA that is establishing a site to site with your Sonicwall that has a dynamic ip.

MO
0
 
SDTownsendAuthor Commented:
Do I need to set mode to aggressive on the Cisco ASA if it is already on the Sonicwall?
0
 
Michael OrtegaSales & Systems EngineerCommented:
Your Sonicwall will be the initiator and needs to be in aggressive mode. The Cisco ASA needs to be in aggressive mode as well.

MO
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

  • 4
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now