Solved

ASA VPN change remote inside network IP.

Posted on 2013-06-09
5
297 Views
Last Modified: 2013-06-15
I had to change the IP for a client's internal network and the external IP is to remain the same. Our end of the site to site VPN is on an ASA 5505.

Scenario is: old ip had to be changed from 10.1.20.10 255.255.255.255 to 10.1.20.7 255.255.255.255 on the inside remote network. I have tried to modify the old tunnel and built new one "multiple times" but when the tunnel comes up it is associating with the old IP of 10.1.20.10. Apparently the data center where the vpn is going changed the server to another one. I do not have access to the other end of the tunnel, but they said they changed it for me to be able to connect with the new IP. They also left the old tunnel up as well.

Help Please :)
0
Comment
Question by:bnugent73
  • 4
5 Comments
 

Author Comment

by:bnugent73
ID: 39233489
Did a show run to find any mention of the old ip and didn't see anything crypto map is to new ip etc....
0
 
LVL 8

Expert Comment

by:TMekeel
ID: 39233665
Can you post a sanitized sh run please?
0
 

Author Comment

by:bnugent73
ID: 39234603
Hello, I will try to sanitize a sh run. This is a production ASA so just a lot of sanitizing to do. I will be working on it though.

Thanks
0
 

Accepted Solution

by:
bnugent73 earned 0 total points
ID: 39234748
Problem solved. Guys on other end of tunnel didn't make all changes, but they have now, so Thank the LORD!

Thanks
0
 

Author Closing Comment

by:bnugent73
ID: 39249731
"Changes on other end of tunnel were not made" That is all I could get from them.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

There are some basic methods for preventing attacks on, hacking of and unauthorized access to a network -- maybe not completely, but up to a certain level. Start with a well-reputed firewall and unified threat management (UTM) system -- a gateway…
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question