Solved

How to configure EZVPN on ASA hub that already has L2L IPSEC VPNs

Posted on 2013-06-10
2
375 Views
Last Modified: 2013-07-02
Dear Experts,

How would I configure EZVPN via ASDM on an ASA 5505 hub that already has three L2L IPSEC VPNs?
Can this work with a default/out-of-the-box ASA 5505 ASA Version 8.2(1) that only has the base license?
I would sincerely be grateful for any suggestions or guidance with my burdening issue.

Sincerely,

MAS
HQ-ASA-5-17-2013-Copy.txt
0
Comment
Question by:DontTreadOnMe
2 Comments
 
LVL 12

Accepted Solution

by:
Fidelius earned 500 total points
ID: 39237347
Hello,

Here are Config guides how to do it through CLI and ASDM:
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ezvpn505.html

http://www.cisco.com/en/US/docs/security/asa/asa72/asdm52/selected_procedures/asdm5505.html

Also one example here http://www.gandalfk7.it/?p=93

Hope it will help!

P.S. In attach is my running EZVPN config.
EZVPN-config.txt
0
 

Author Closing Comment

by:DontTreadOnMe
ID: 39295592
Thank you. I sincerely appreciate you help. Many thanks. :-)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Edgemax OS VPN, to Barracuda Link Balancer 7 150
High Receive Utilization on my Cisco 3560 V2 10 60
How do I modify Ubigate for new ISP? 2 74
Resource cost of NAT vs routing 3 64
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now