ASA 5506 EasyVPN & DMZ "ERROR: This configuration cannot be modified with Cisco Easy VPN Remote enabled."

travisryan
travisryan used Ask the Experts™
on
I need to set up a DMZ interface for my ASA 5506 (IOS ver 9.5.2) that's set up as an Easy VPN client. When I try to modify the third interface I get this: "ERROR: This configuration cannot be modified with Cisco Easy VPN Remote enabled."

Googling around I found this thread which says such a thing should be possible but doesn't mention the above error message: https://supportforums.cisco.com/discussion/12460931/dmz-interface-asa-5506-x

Googling around for that error message I can only find the below two posts that don't seem to have anything to do with my issue:

https://supportforums.cisco.com/discussion/11219271/ssl-vpn-not-working
https://supportforums.cisco.com/discussion/11092461/asa5505-vlan1-subnet-change-remotely

I have the sneaking suspicion I can't have Easy VPN (client) and DMZ set up on the same device but I hope I'm wrong. Any help is appreciated.
Comment
Watch Question

Do more with

Expert Office
EXPERT OFFICE® is a registered trademark of EXPERTS EXCHANGE®
Senior infrastructure engineer
Top Expert 2012
Commented:
I don't use the easy vpn client that much, but to me it looks like a site2site VPN.

If that's the case then it seems logical you can't have a DMZ on that interface. A DMZ is a separate 'inside' zone in your firewall which is exposed to the outside, but traffic has to traverse through the firewall.
An easy VPN client interface is on the outside of your firewall to be able to connect to a VPN server over the internet.
From a logical point of view, you can't have (and don't want) a DMZ on the outside interface.

Author

Commented:
The situation I'm running into is that the firewall is at a remote location, it's set up with Easy VPN so users, phones, printers etc at that location can just plug in or get on wifi and have a connection like they were sitting in our home location. Now we have another business that wants their own connection in our location.

My plan was to sit them on the DMZ and pass all traffic destined for their device through and block their device from getting to the inside network (my company's network). Is there another way to accomplish this with the equipment we already have?
Ernie BeekSenior infrastructure engineer
Top Expert 2012

Commented:
Doesn't the 5506 has eight interfaces? So can't you use another interface for that?
Ensure you’re charging the right price for your IT

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden using our free interactive tool and use it to determine the right price for your IT services. Start calculating Now!

Author

Commented:
Ernie, I ended up finding an alternative solution. Thanks for all of your help.
Ernie BeekSenior infrastructure engineer
Top Expert 2012

Commented:
Good to hear.
Would you mind sharing your solution with us? Perhaps someone else can profit from that.

Author

Commented:
Ernie, instead of putting equipment from another company on the inside of my asa (since DMZ is not available) and trying to create ACL rules to isolate it, I requested a small range static IPs from my internet provider, plugged the internet connection into a dumb switch, gave the outside interface on my ASA one static IP,  then let the other company plug their equipment into that dumb switch and gave them an outside IP address to use from that static range.

This way, their equipment never directly interacts with my equipment.
Ernie BeekSenior infrastructure engineer
Top Expert 2012

Commented:
Good call, and everybody is happy. Thanks for sharing.

Do more with

Expert Office
Submit tech questions to Ask the Experts™ at any time to receive solutions, advice, and new ideas from leading industry professionals.

Start 7-Day Free Trial