?
Solved

ASA VPN change remote inside network IP.

Posted on 2013-06-09
5
Medium Priority
?
305 Views
Last Modified: 2013-06-15
I had to change the IP for a client's internal network and the external IP is to remain the same. Our end of the site to site VPN is on an ASA 5505.

Scenario is: old ip had to be changed from 10.1.20.10 255.255.255.255 to 10.1.20.7 255.255.255.255 on the inside remote network. I have tried to modify the old tunnel and built new one "multiple times" but when the tunnel comes up it is associating with the old IP of 10.1.20.10. Apparently the data center where the vpn is going changed the server to another one. I do not have access to the other end of the tunnel, but they said they changed it for me to be able to connect with the new IP. They also left the old tunnel up as well.

Help Please :)
0
Comment
Question by:bnugent73
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
5 Comments
 

Author Comment

by:bnugent73
ID: 39233489
Did a show run to find any mention of the old ip and didn't see anything crypto map is to new ip etc....
0
 
LVL 8

Expert Comment

by:TMekeel
ID: 39233665
Can you post a sanitized sh run please?
0
 

Author Comment

by:bnugent73
ID: 39234603
Hello, I will try to sanitize a sh run. This is a production ASA so just a lot of sanitizing to do. I will be working on it though.

Thanks
0
 

Accepted Solution

by:
bnugent73 earned 0 total points
ID: 39234748
Problem solved. Guys on other end of tunnel didn't make all changes, but they have now, so Thank the LORD!

Thanks
0
 

Author Closing Comment

by:bnugent73
ID: 39249731
"Changes on other end of tunnel were not made" That is all I could get from them.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this video, Percona Director of Solution Engineering Jon Tobin discusses the function and features of Percona Server for MongoDB. How Percona can help Percona can help you determine if Percona Server for MongoDB is the right solution for …
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question