Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

loading cisco ASA config into new ASA

Posted on 2014-01-27
8
Medium Priority
?
686 Views
Last Modified: 2014-01-28
I just had an ASA fail on me and now I need to load the old ASA config into the new ASA. I need to setup SSH. I also have IPsec VPN tunnels setup as wel. I know some of the basic SSH commands but I also remember that when it was setup, I needed to setup something using a crypto command or RSA? Can someone let me know how to setup SSH on the ASA from scratch? Also, do I have to setup the rsa/crypto for my IPsec tunnel as well?

Thanks,

Justin
0
Comment
Question by:JustinGSEIWI
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
8 Comments
 
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39812902
Hi Justin,

Cant you boot up using the serial cable and software like putty?
From there you can restore your config.
0
 

Author Comment

by:JustinGSEIWI
ID: 39812907
I am off site and have a vendor working on this. I am asking this just for my reference. When you load the config, the passwords are not in it so we will need to add the passwords again right? I figured we would also have to redo the cyrpto part of SSH. Is that not true? If that is the case, then it should just work once we enter the new password for SSH.
0
 
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39812961
Hi

Passwords are encrypted in your config file so if you restore a working config you have cloned your previous ASA.
0
Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

 

Author Comment

by:JustinGSEIWI
ID: 39813034
I have the config in a text file and the password shows as *. Are they encrypted somewhere else? I think we need to set up the passwords for the ipsec connections again. I am wondering if I also need to setup the RSA/crypto as well?
0
 
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39813082
The login password is used for Telnet and SSH connections.

Little quote from Cisco

The password is saved in the configuration in encrypted form, so you cannot view the original password after you enter it. Use the no password command to restore the password to the default setting.
0
 

Author Comment

by:JustinGSEIWI
ID: 39813161
I tried entering the following syntax into my ASA to establish the ipsec vpn tunnel between two ASA's.

crypto map vpnmap 20 match address vpn2RI
crypto map vpnmap 20 set peer 242.119.136.92
crypto map vpnmap 20 set transform-set STRONG
crypto map vpnmap 20 set security-association lifetime seconds 28800
crypto map vpnmap 20 set security-association lifetime kilobytes 4608000


tunnel-group 192.119.236.10 type ipsec-l2l
tunnel-group 192.119.236.10 ipsec-attributes
pre-shared-key password

When I did that, I got this error.

ERROR: transform set with tag "STRONG" does not exist.


What does that mean? I am unable to establish the VPN tunnel.
0
 
LVL 23

Accepted Solution

by:
Patrick Bogers earned 2000 total points
ID: 39813212
Have a look into the ASA site to site step by step from Cisco Here
0
 

Author Comment

by:JustinGSEIWI
ID: 39813395
I took down my config.
0

Featured Post

The Ideal Solution for Multi-Display Applications

Check out ATEN’s VS1912 12-Port DP Video Wall Media Player at InfoComm 2017. Kerri describes how easy it is to design creative video walls in asymmetric layouts and schedule detailed playlists ahead of time with its advanced scheduling feature.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When speed and performance are vital to revenue, companies must have complete confidence in their cloud environment.
You deserve ‘straight talk’ from your cloud provider about your risk, your costs, security, uptime and the processes that are in place to protect your mission-critical applications.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
Suggested Courses

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question