Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

ASA VPN change remote inside network IP.

Posted on 2013-06-09
5
Medium Priority
?
317 Views
Last Modified: 2013-06-15
I had to change the IP for a client's internal network and the external IP is to remain the same. Our end of the site to site VPN is on an ASA 5505.

Scenario is: old ip had to be changed from 10.1.20.10 255.255.255.255 to 10.1.20.7 255.255.255.255 on the inside remote network. I have tried to modify the old tunnel and built new one "multiple times" but when the tunnel comes up it is associating with the old IP of 10.1.20.10. Apparently the data center where the vpn is going changed the server to another one. I do not have access to the other end of the tunnel, but they said they changed it for me to be able to connect with the new IP. They also left the old tunnel up as well.

Help Please :)
0
Comment
Question by:bnugent73
  • 4
5 Comments
 

Author Comment

by:bnugent73
ID: 39233489
Did a show run to find any mention of the old ip and didn't see anything crypto map is to new ip etc....
0
 
LVL 8

Expert Comment

by:TMekeel
ID: 39233665
Can you post a sanitized sh run please?
0
 

Author Comment

by:bnugent73
ID: 39234603
Hello, I will try to sanitize a sh run. This is a production ASA so just a lot of sanitizing to do. I will be working on it though.

Thanks
0
 

Accepted Solution

by:
bnugent73 earned 0 total points
ID: 39234748
Problem solved. Guys on other end of tunnel didn't make all changes, but they have now, so Thank the LORD!

Thanks
0
 

Author Closing Comment

by:bnugent73
ID: 39249731
"Changes on other end of tunnel were not made" That is all I could get from them.
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it'…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question