Solved

loading cisco ASA config into new ASA

Posted on 2014-01-27
8
659 Views
Last Modified: 2014-01-28
I just had an ASA fail on me and now I need to load the old ASA config into the new ASA. I need to setup SSH. I also have IPsec VPN tunnels setup as wel. I know some of the basic SSH commands but I also remember that when it was setup, I needed to setup something using a crypto command or RSA? Can someone let me know how to setup SSH on the ASA from scratch? Also, do I have to setup the rsa/crypto for my IPsec tunnel as well?

Thanks,

Justin
0
Comment
Question by:JustinGSEIWI
  • 4
  • 4
8 Comments
 
LVL 19

Expert Comment

by:Patricksr1972
ID: 39812902
Hi Justin,

Cant you boot up using the serial cable and software like putty?
From there you can restore your config.
0
 

Author Comment

by:JustinGSEIWI
ID: 39812907
I am off site and have a vendor working on this. I am asking this just for my reference. When you load the config, the passwords are not in it so we will need to add the passwords again right? I figured we would also have to redo the cyrpto part of SSH. Is that not true? If that is the case, then it should just work once we enter the new password for SSH.
0
 
LVL 19

Expert Comment

by:Patricksr1972
ID: 39812961
Hi

Passwords are encrypted in your config file so if you restore a working config you have cloned your previous ASA.
0
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

 

Author Comment

by:JustinGSEIWI
ID: 39813034
I have the config in a text file and the password shows as *. Are they encrypted somewhere else? I think we need to set up the passwords for the ipsec connections again. I am wondering if I also need to setup the RSA/crypto as well?
0
 
LVL 19

Expert Comment

by:Patricksr1972
ID: 39813082
The login password is used for Telnet and SSH connections.

Little quote from Cisco

The password is saved in the configuration in encrypted form, so you cannot view the original password after you enter it. Use the no password command to restore the password to the default setting.
0
 

Author Comment

by:JustinGSEIWI
ID: 39813161
I tried entering the following syntax into my ASA to establish the ipsec vpn tunnel between two ASA's.

crypto map vpnmap 20 match address vpn2RI
crypto map vpnmap 20 set peer 242.119.136.92
crypto map vpnmap 20 set transform-set STRONG
crypto map vpnmap 20 set security-association lifetime seconds 28800
crypto map vpnmap 20 set security-association lifetime kilobytes 4608000


tunnel-group 192.119.236.10 type ipsec-l2l
tunnel-group 192.119.236.10 ipsec-attributes
pre-shared-key password

When I did that, I got this error.

ERROR: transform set with tag "STRONG" does not exist.


What does that mean? I am unable to establish the VPN tunnel.
0
 
LVL 19

Accepted Solution

by:
Patricksr1972 earned 500 total points
ID: 39813212
Have a look into the ASA site to site step by step from Cisco Here
0
 

Author Comment

by:JustinGSEIWI
ID: 39813395
I took down my config.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IPv6 question 1 17
Radius ASA Authentication Failed 4 75
Support licences 3 25
Cisco  3750E switches 1 14
In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question