• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 694
  • Last Modified:

loading cisco ASA config into new ASA

I just had an ASA fail on me and now I need to load the old ASA config into the new ASA. I need to setup SSH. I also have IPsec VPN tunnels setup as wel. I know some of the basic SSH commands but I also remember that when it was setup, I needed to setup something using a crypto command or RSA? Can someone let me know how to setup SSH on the ASA from scratch? Also, do I have to setup the rsa/crypto for my IPsec tunnel as well?

Thanks,

Justin
0
JustinGSEIWI
Asked:
JustinGSEIWI
  • 4
  • 4
1 Solution
 
Patrick BogersDatacenter platform engineer LindowsCommented:
Hi Justin,

Cant you boot up using the serial cable and software like putty?
From there you can restore your config.
0
 
JustinGSEIWIAuthor Commented:
I am off site and have a vendor working on this. I am asking this just for my reference. When you load the config, the passwords are not in it so we will need to add the passwords again right? I figured we would also have to redo the cyrpto part of SSH. Is that not true? If that is the case, then it should just work once we enter the new password for SSH.
0
 
Patrick BogersDatacenter platform engineer LindowsCommented:
Hi

Passwords are encrypted in your config file so if you restore a working config you have cloned your previous ASA.
0
Never miss a deadline with monday.com

The revolutionary project management tool is here!   Plan visually with a single glance and make sure your projects get done.

 
JustinGSEIWIAuthor Commented:
I have the config in a text file and the password shows as *. Are they encrypted somewhere else? I think we need to set up the passwords for the ipsec connections again. I am wondering if I also need to setup the RSA/crypto as well?
0
 
Patrick BogersDatacenter platform engineer LindowsCommented:
The login password is used for Telnet and SSH connections.

Little quote from Cisco

The password is saved in the configuration in encrypted form, so you cannot view the original password after you enter it. Use the no password command to restore the password to the default setting.
0
 
JustinGSEIWIAuthor Commented:
I tried entering the following syntax into my ASA to establish the ipsec vpn tunnel between two ASA's.

crypto map vpnmap 20 match address vpn2RI
crypto map vpnmap 20 set peer 242.119.136.92
crypto map vpnmap 20 set transform-set STRONG
crypto map vpnmap 20 set security-association lifetime seconds 28800
crypto map vpnmap 20 set security-association lifetime kilobytes 4608000


tunnel-group 192.119.236.10 type ipsec-l2l
tunnel-group 192.119.236.10 ipsec-attributes
pre-shared-key password

When I did that, I got this error.

ERROR: transform set with tag "STRONG" does not exist.


What does that mean? I am unable to establish the VPN tunnel.
0
 
Patrick BogersDatacenter platform engineer LindowsCommented:
Have a look into the ASA site to site step by step from Cisco Here
0
 
JustinGSEIWIAuthor Commented:
I took down my config.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 4
  • 4
Tackle projects and never again get stuck behind a technical roadblock.
Join Now