Add Cisco ASA5505 into existing network for VPN access

Posted on 2014-02-24
Last Modified: 2014-07-13
We have an existing networking which we are looking to add an ASA5505 to provide Anyconnect VPN access.

I am looking for some advise on what the best place to add this will be based on the network description below.

Currently we have a single Cisco router doing all our network services including DMVPN, WebVPN, GRE Tunnel endpoint for our portable /24, NAT, firewall, VLANs.

Gig0/0 - WAN (ISP allocated Static IP address)
Gig0/1 - Our DMZ (which is the GRE tunnel routed to this interface)
Gig0/2 - Our Internal Networks (2 VLANs Voice/Data) configured as a DOT1Q trunk.

Our public subnet is provided via a GRE tunnel from our ISP and we decap this on the router
WebVPN runs on this router and uses the WAN address for SSL access.
We run a DMVPN for our branches where this router is the hub.
NAT runs between G0/0 and G0/2
High number of FW rules between various interfaces

Primarily I want the ASA to take over the VPN access as the IOS WebVPN has a number of limitations.  The VPN will allow access to our Internal Networks AND those networks on our DMVPN network.   I was going to use part of the DMZ /24 to give the ASA a public address.

As I think I will need to do some rearchitecting anyway (I cannot just throw the ASA in the VPN and connect the other port to the restricted network), I was thinking of moving the DMZ off the router and onto this ASA.  I do have a concern though that the ASA cannot do GRE so I may need to throw a small router in front to do the GRE decap before the ASA.

The other thing I need to look at is whether I can move the DMVPN tunnels onto the ASA (note - does not need to be DMVPN but I do need to be able to use dynamic client endpoints).  

Advise anyone ?
Question by:RescueIT
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 20

Expert Comment

ID: 39887060
How many VPN devices do you have? Sounds like you might want to upgrade the ASA to a 5510 or something (I know they are EOL, but you get my drift.)

I would let the ASA handle your firewall and VPN capabilities. That's what is what designed for.

You can not terminate the GRE tunnel, but you can use the ASA to encrypt the tunnel. Please see this link.

So you have your ASA doing the encryption/decryption, and you just have your router doing the routing. Depending on how you have your set up from the ISP, you may not need a router in front of the ASA.

ASA can handle dynamic endpoints as well.

Author Comment

ID: 39887256
I have only the one ASA5505.  Our DMVPN endpoints are IOS routers (we have 3 DMVPN endpoints) so I dont think we need anything bigger than the 5505.

I need to decap the GRE at the first hop in order to allow me to subnet this otherwise I wont have enough public IP addresses to use to connect the ASA to the router.

I need to look at the dynamic endpoint capability for the ASA - but my understanding is that we cannot carry a routing protocol over this.
LVL 20

Accepted Solution

agonza07 earned 500 total points
ID: 39887915
I think you'll need a router to decap the GRE in front of the ASA then if that's how the ISP has their end configured.

With 3 VPN tunnels you should be good on the ASA 5505, just keep an eye on that CPU.

You won't be able to carry the routing protocol on the ASA, but you can do the encryption and pass the routing to your router to handle that. I currently use this model as a backup to our MPLS circuits. I have GRE tunnels with the IPSEC piece terminating at the ASA and just passing the GRE traffic to my MPLS router for it to handle the dynamic routing. If my MPLS link goes down, it automatically picks up the GRE link. That first link I sent above shows how to do this.

Please see this link below for more info on DMVPN on ASA. Looks like you'll need to convert those tunnels.

You can set up a site-to-site tunnel using a dynamic-to-static configuration.

DMVPN is only supported on cisco routers, so not possible to implement it in routers.
This is because DMVPN still uses GRE which is supported only on routers.

Here's an example of a site-to-site when one end has a dynamic IP address assigned:

Featured Post

Simple, centralized multimedia control

Watch and learn to see how ATEN provided an easy and effective way for three jointly-owned pubs to control the 60 televisions located across their three venues utilizing the ATEN Control System, Modular Matrix Switch and HDBaseT extenders.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Recovering ASA 5505 vpn config from flash card? 7 57
Logging into A Cisco switch from another switch or router 2 56
wifi security 11 41
RDP exploit 12 13
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Many of the companies I’ve worked with have embraced cloud solutions due to their desire to “get out of the datacenter business.” The ability to achieve better security and availability, and the speed with which they are able to deploy, is far grea…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question