Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

loading cisco ASA config into new ASA

Posted on 2014-01-27
8
Medium Priority
?
692 Views
Last Modified: 2014-01-28
I just had an ASA fail on me and now I need to load the old ASA config into the new ASA. I need to setup SSH. I also have IPsec VPN tunnels setup as wel. I know some of the basic SSH commands but I also remember that when it was setup, I needed to setup something using a crypto command or RSA? Can someone let me know how to setup SSH on the ASA from scratch? Also, do I have to setup the rsa/crypto for my IPsec tunnel as well?

Thanks,

Justin
0
Comment
Question by:JustinGSEIWI
  • 4
  • 4
8 Comments
 
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39812902
Hi Justin,

Cant you boot up using the serial cable and software like putty?
From there you can restore your config.
0
 

Author Comment

by:JustinGSEIWI
ID: 39812907
I am off site and have a vendor working on this. I am asking this just for my reference. When you load the config, the passwords are not in it so we will need to add the passwords again right? I figured we would also have to redo the cyrpto part of SSH. Is that not true? If that is the case, then it should just work once we enter the new password for SSH.
0
 
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39812961
Hi

Passwords are encrypted in your config file so if you restore a working config you have cloned your previous ASA.
0
Lessons on Wi-Fi & Recommendations on KRACK

Simplicity and security can be a difficult  balance for any business to tackle. Join us on December 6th for a look at your company's biggest security gap. We will also address the most recent attack, "KRACK" and provide recommendations on how to secure your Wi-Fi network today!

 

Author Comment

by:JustinGSEIWI
ID: 39813034
I have the config in a text file and the password shows as *. Are they encrypted somewhere else? I think we need to set up the passwords for the ipsec connections again. I am wondering if I also need to setup the RSA/crypto as well?
0
 
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39813082
The login password is used for Telnet and SSH connections.

Little quote from Cisco

The password is saved in the configuration in encrypted form, so you cannot view the original password after you enter it. Use the no password command to restore the password to the default setting.
0
 

Author Comment

by:JustinGSEIWI
ID: 39813161
I tried entering the following syntax into my ASA to establish the ipsec vpn tunnel between two ASA's.

crypto map vpnmap 20 match address vpn2RI
crypto map vpnmap 20 set peer 242.119.136.92
crypto map vpnmap 20 set transform-set STRONG
crypto map vpnmap 20 set security-association lifetime seconds 28800
crypto map vpnmap 20 set security-association lifetime kilobytes 4608000


tunnel-group 192.119.236.10 type ipsec-l2l
tunnel-group 192.119.236.10 ipsec-attributes
pre-shared-key password

When I did that, I got this error.

ERROR: transform set with tag "STRONG" does not exist.


What does that mean? I am unable to establish the VPN tunnel.
0
 
LVL 23

Accepted Solution

by:
Patrick Bogers earned 2000 total points
ID: 39813212
Have a look into the ASA site to site step by step from Cisco Here
0
 

Author Comment

by:JustinGSEIWI
ID: 39813395
I took down my config.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
As managed cloud service providers, we often get asked to intervene when cloud deployments go awry. Attracted by apparent ease-of-use, flexibility and low computing costs, companies quickly adopt leading public cloud platforms such as Amazon Web Ser…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question