Add Cisco ASA5505 into existing network for VPN access

We have an existing networking which we are looking to add an ASA5505 to provide Anyconnect VPN access.

I am looking for some advise on what the best place to add this will be based on the network description below.

Currently we have a single Cisco router doing all our network services including DMVPN, WebVPN, GRE Tunnel endpoint for our portable /24, NAT, firewall, VLANs.

Gig0/0 - WAN (ISP allocated Static IP address)
Gig0/1 - Our DMZ (which is the GRE tunnel routed to this interface)
Gig0/2 - Our Internal Networks (2 VLANs Voice/Data) configured as a DOT1Q trunk.

Our public subnet is provided via a GRE tunnel from our ISP and we decap this on the router
WebVPN runs on this router and uses the WAN address for SSL access.
We run a DMVPN for our branches where this router is the hub.
NAT runs between G0/0 and G0/2
High number of FW rules between various interfaces

Primarily I want the ASA to take over the VPN access as the IOS WebVPN has a number of limitations.  The VPN will allow access to our Internal Networks AND those networks on our DMVPN network.   I was going to use part of the DMZ /24 to give the ASA a public address.

As I think I will need to do some rearchitecting anyway (I cannot just throw the ASA in the VPN and connect the other port to the restricted network), I was thinking of moving the DMZ off the router and onto this ASA.  I do have a concern though that the ASA cannot do GRE so I may need to throw a small router in front to do the GRE decap before the ASA.

The other thing I need to look at is whether I can move the DMVPN tunnels onto the ASA (note - does not need to be DMVPN but I do need to be able to use dynamic client endpoints).  

Advise anyone ?
RescueITAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

agonza07Commented:
How many VPN devices do you have? Sounds like you might want to upgrade the ASA to a 5510 or something (I know they are EOL, but you get my drift.)

I would let the ASA handle your firewall and VPN capabilities. That's what is what designed for.

You can not terminate the GRE tunnel, but you can use the ASA to encrypt the tunnel. Please see this link.
http://allthingsnetworking.wordpress.com/2012/09/21/encrypt-your-gre-tunnel-with-cisco-asa/

So you have your ASA doing the encryption/decryption, and you just have your router doing the routing. Depending on how you have your set up from the ISP, you may not need a router in front of the ASA.

ASA can handle dynamic endpoints as well.
0
RescueITAuthor Commented:
I have only the one ASA5505.  Our DMVPN endpoints are IOS routers (we have 3 DMVPN endpoints) so I dont think we need anything bigger than the 5505.

I need to decap the GRE at the first hop in order to allow me to subnet this otherwise I wont have enough public IP addresses to use to connect the ASA to the router.

I need to look at the dynamic endpoint capability for the ASA - but my understanding is that we cannot carry a routing protocol over this.
0
agonza07Commented:
I think you'll need a router to decap the GRE in front of the ASA then if that's how the ISP has their end configured.

With 3 VPN tunnels you should be good on the ASA 5505, just keep an eye on that CPU.

You won't be able to carry the routing protocol on the ASA, but you can do the encryption and pass the routing to your router to handle that. I currently use this model as a backup to our MPLS circuits. I have GRE tunnels with the IPSEC piece terminating at the ASA and just passing the GRE traffic to my MPLS router for it to handle the dynamic routing. If my MPLS link goes down, it automatically picks up the GRE link. That first link I sent above shows how to do this.

Please see this link below for more info on DMVPN on ASA. Looks like you'll need to convert those tunnels.
https://supportforums.cisco.com/thread/2026055

You can set up a site-to-site tunnel using a dynamic-to-static configuration.

DMVPN is only supported on cisco routers, so not possible to implement it in routers.
This is because DMVPN still uses GRE which is supported only on routers.

Here's an example of a site-to-site when one end has a dynamic IP address assigned:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.