Solved

ASA VPN change remote inside network IP.

Posted on 2013-06-09
5
294 Views
Last Modified: 2013-06-15
I had to change the IP for a client's internal network and the external IP is to remain the same. Our end of the site to site VPN is on an ASA 5505.

Scenario is: old ip had to be changed from 10.1.20.10 255.255.255.255 to 10.1.20.7 255.255.255.255 on the inside remote network. I have tried to modify the old tunnel and built new one "multiple times" but when the tunnel comes up it is associating with the old IP of 10.1.20.10. Apparently the data center where the vpn is going changed the server to another one. I do not have access to the other end of the tunnel, but they said they changed it for me to be able to connect with the new IP. They also left the old tunnel up as well.

Help Please :)
0
Comment
Question by:bnugent73
  • 4
5 Comments
 

Author Comment

by:bnugent73
ID: 39233489
Did a show run to find any mention of the old ip and didn't see anything crypto map is to new ip etc....
0
 
LVL 8

Expert Comment

by:TMekeel
ID: 39233665
Can you post a sanitized sh run please?
0
 

Author Comment

by:bnugent73
ID: 39234603
Hello, I will try to sanitize a sh run. This is a production ASA so just a lot of sanitizing to do. I will be working on it though.

Thanks
0
 

Accepted Solution

by:
bnugent73 earned 0 total points
ID: 39234748
Problem solved. Guys on other end of tunnel didn't make all changes, but they have now, so Thank the LORD!

Thanks
0
 

Author Closing Comment

by:bnugent73
ID: 39249731
"Changes on other end of tunnel were not made" That is all I could get from them.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question