Configuration VPN 3000 - redundancy - management

We have two hubs configured as a redundant pair.

I realize there is no automatic method of synchronization config but wondered which is the easiest and fastest way to copy changes throughout.

Is it possible to save the config and just edit the IP addresses for the public and private interfaces before loading it on the backup device?

All done and managed?

Other advice - we do not have a box of ACS btw?

Thanks in advance.

The simplest is that you have suggested, copy the config from the original, and load it in the backup. Restart the backup and it will come to the top with the exact configuration as well as the original, so it is wise to disconnect it before restarting network, change IP addresses via the console port, and then plug it into the network.

Otherwise, if you feel comfortable, you can copy the config from the original, edit it using any text editor, search for all occurrences of the original IP addresses and change them for backup, save this file, copy it to the backup and it reboot. It should come with the same exact configuration, just different IP addresses.

I use this second technique each week when visitors send me their configuration files for troubleshooting, I just change their IP addresses to my hubs ones, copy the file to the top and restart my hub, sometimes with their config but my IP addresses.

The only catch is to make sure the hubs are of the same type. For example, don't just edit a config file 3080's and copy it into a 3005, cause, they are different. Similarly, make sure that the versions of the software are the same, different versions SW to write different things in the config file. If your in are a redundant pair, then it should be OK if.

Tags: Cisco Security

Similar Questions

  • How to configure VPN 3000 Concentrator for remote access

    I have inherited a VPN concentrator and want to configure it to provide remote access to my internal laboratory network when I'm traveling.  Private interface is configured as 192.168.1.240/24.  Public interface is configured as one of my public IP addresses.  I have a public IP pool on the back side of a cable modem Roadrunner.  I created a pool of addresses for clients such as 192.168.1.200 by 192.168.1.205.  I created all group configurations, group and user base.

    In the IP Routing tab, I see a default route pointing to my IP address of public gateway - the IP address of my box of roadrunner cable modem gateway.

    Since my VPN client, I am able to connect to the VPN concentrator.  I get an address from the pool and check the details of the tunnel under the statistics section shows IP address correct pool for the customer and the correct public IP address of my VPN reorga

    Jeff,

    According to statistics, it seems that the client sends traffic to the hub, but his answer not get back.

    We need check the hub settings itself.

    I need check the hub settings and that it is a GUI based device so I can't even ask to see the technology and the only option available is to WebEx.

    You're ok with webex, pls lemme session comfortable time id and e-mail to send the invitation, it takes no more time and we will carry it out

    Thank you

    Ankur

  • configuration VPN concentrator 3000 backup

    Hello

    Can someone tell me how can I take backup of my Cisco VPN 3000 series concentrator configuration?

    in GUI and command mode?

    I couldn't find any good document describing.

    Here is the link on how to Backup/restore configs and work with the file system.

    http://www.Cisco.com/en/us/docs/security/vpn3000/vpn3000_47/Administration/Guide/Fileman.html

  • SNMP VPN 3000

    Hi all

    I'm not finding where to set the snmp over VPN 3000 community.

    I need read date of flow on Ethernet interfaces. but I'm able to get only VPN 3000 traps to an snmp system but I 'don't get read of snmp to VPN 3000 community.

    where and how I can setup the snmp over VPN 3000 community.

    Thank you

    It is under the following configuration section:

    Configuration | System | Management protocols. SNMP communities

    Hope that helps.

  • LAN-to-LAN tunnel between VPN 3000 and Cisco 1721

    Hello

    I have a current LAN-to-LAN tunnel configuration between VPN 3000 (3.6) and Cisco 1721 (12.2 (11) T).

    When I use the encryption = authentication and Des-56 = ESP\MD5\HMAC-128 for the IPSec Security Association, everything works fine.

    However, I would like to Turn off encryption for some time getting the speed improvements, so I changed

    Encryption = null esp (in 1721) and to "null" in VPN-3000.

    Now the tunnel is setup but I can spend only ICMP traffic. When I pass the traffic UDP\TCP the message below appears the Cisco 1721

    % C1700_EM-1-ERROR: error in packet-rx: pad size error, id 75, hen offset 0

    Has anyone seen this behavior?

    All those put in place an IPSec Tunnel with only the ESP authentication and NO encryption between VPN-3000 and Cisco 1721?

    Thanx------Naman

    Naman,

    Disable you the vpn Accelerator? "no accel crypto engine. Sure that you can't do with a null module vpn.

    Kurtis Durrett

  • L2l IPSec VPN 3000 and PIX 501

    Hello

    I have a remote site that has a broadband internet connection and uses a PIX 501.  We wanted to connect them with our main office using our VPN 3000 via VPN site-to-site.

    I followed the following documentation:

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2284/products_configuration_example09186a00800949d2.shtml#tshoot

    However the L2L session does not appear on the hub when I check the active sessions.

    The network diagram, as well as the PIX config and the screenshots of the VPN configuration for the IPSec-L2L tunnel is attached.

    Any help or advice are appreciated.

    I just noticed that the PIX firewall, the phase 1 paramateres are not configured. You must configure the same PASE 1 and phase 2 settings on both ends of the tunnel.

    For example, on CVPN 3000, you have configured settings Phase 1 as 3DES, pre-shared key etc... We have the same configuration on the PIX firewall too.

    Here is an example of sample config

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2284/products_configuration_example09186a00800949d2.shtml

    I hope this helps!

  • VPN between a PIX and a VPN 3000

    I'm trying to set up a VPN between PIX and a VPN 3000. All configurations are complete, but the tunnel has not been established. On the PIX, to 'see the crypto engine' and ' show isakmp his ' orders, I do not see the tunnel. Of "show ipsec his ' command, I can see the mistakes"#send"continues to increase when I try to connect to the remote network. Here is the copy - paste command:

    Tag crypto map: myvpnmap, local addr. 10.70.24.2

    local ident (addr, mask, prot, port): (10.70.24.128/255.255.255.128/0/0)

    Remote ident (addr, mask, prot, port): (10.96.0.0/255.224.0.0/0/0)

    current_peer: 10.70.16.5:0

    LICENCE, flags is {origin_is_acl},

    #pkts program: encrypt 0, #pkts: 0, #pkts 0 digest

    #pkts decaps: 0, #pkts decrypt: 0, #pkts check 0

    compressed #pkts: 0, unzipped #pkts: 0

    #pkts uncompressed: 0, #pkts compr. has failed: 0, #pkts decompress failed:

    #send 12, #recv errors 0

    local crypto endpt. : 10.70.24.2, remote Start crypto. : 10.70.16.5

    Path mtu 1500, fresh ipsec generals 0, media, mtu 1500

    current outbound SPI: 0

    SAS of the esp on arrival:

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:

    outgoing ah sas:

    outgoing CFP sas:

    Obviously, the PIX identifies protected traffic but failed to establish the tunnel. I was wondering what could be the reason for these kind of mistakes? That means them growing '#send errors?

    Thank you very much!

    Sending error mean simply the PIX is grateful to encrypt this traffic, but there is no built tunnel and so it must drop the package.

    you will need to look at why the tunnel is not under construction however, "sending error" are just a byproduct of some other configuration issue. On the PIX, it looks like you would have something like:

    Crypto ip 10.70.24.128 access list allow 255.255.255.128 10.96.0.0 255.224.0.0

    On the 3000 under the L2L section and the Local and remote network, you need the exact opposite of the latter, then it would be:

    / Local network mask = 10.96.0.0/0.31.255.255

    / Remote network mask = 10.70.24.128/0.0.0.127

    If you have something else the tunnel will fail to come. Otherwise, we see that the Cryptography debugs the PIX and the trunk of the 3000 when the tunnel is built.

  • VPN 3000 and wildcard peer IKE

    The order PIX (http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1027312) reference:

    ISAKMP key address

    To configure a preshared authentication key and associate the key with a host name or the IPSec peer address, use the address isakmp key command. Use the address no. isakmp key command to remove a preshared authentication key and its associated IPSec peer address.

    A 0.0.0.0 netmask. may be entered as a wildcard indicating that any peer IPSec with a preshared key valid given is a valid counterpart.

    Question: Is it possible to do the same thing on the VPN 3000? I have a bunch of PIX firewall, they use DSL w / DHCP. I need them to operate in the Mode of Extension of network, but unlike PIX, I can't seem to get the VPN 3000 to accept the '0.0.0.0' as you can do it with PIX. Anyone has any idea if this is possible or another way to achieve the goal? Any ideas would be greatly appreciated.

    Yep, it's possible, even if it's not too obvious how you do :-) The following configuration example shows how do:

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2284/products_configuration_example09186a00801dd672.shtml

    The key option is the "Default pre-shared key" under the core group.

  • No redundancy management network

    Hello!

    I have a two-node cluster created to serve as hosts of the view; and both nodes are complaining that they do not have redundancy management network. Only... they have! They were identical to my VM upward three nodes, connected to the same blade switches and all. The Service console is on the same vSwitch kernel and VM Network and receives two network adapters, each with a blade separated with his own uplink switch. (two other network cards is dedicated to iSCSI.).

    If two network adapters, two switches and two uplinks.

    What gives? What redundancy more does want?

    You have configured HA before configuring the redundancy?

    In this case use 'reconfigure HA"on each node.

    André

  • When you configure synchronization how sync manages information on two computers? It merges the information?

    When you configure synchronization how sync manages information on two computers? It merges the information?

    Hello!

    Yes, how Sync is that it brings together all the bookmarks and pushes them to all your devices. Same thing with the story.

    You will lose all the information in one of your computers.

  • How can I configure VPN with XP? Is it necessary to use a third party software? It requires a static IP address? It is possible with a dynamic IP?

    I am interested in establishing a VPN for my computer.  I looked at some of the information to help Ms.  I'm missing something in the way of understanding how do or end the connection.

    You can configure VPN regardless of static or dynamic IP, both are possible. You can refer to:

    http://support.Microsoft.com/kb/314076

  • Public interface on VPN 3000

    Hello

    It is as sure to fix the public interface on a VPN 3000 Concentrator on the internet? Or should there be a firewall in front.

    I understand that the public interface is "hardcoded" and only open ports you'd pass firewall anyway, but I just wanted to check with experts to ensure that :-)

    Peter

    Hi Peter,.

    I don't think there are major problems involving the public interface of VPN 3030 Internet. It is means in reality for public access... it is a little hardened to allow only specific protocols... If you have an ID, you can monitor the traffic on this interface and shun unnecessary connections if necessary... you also have filters on the public interface, which allows you to restrict the traffic...

    set the vpn behind a firewall increases the complexity of your network. You may as well have this behind, but it will be a little complicated.

    I hope this helps... all the best

    REDA

  • VPN 3000 RRI

    Hi guys,.

    I'm working on the creation of a vpn between a vpn 3000 and a

    point of control, the problem I have on the vpn3000 is that if I do not have

    Select "reverse road injection" it won't establish the vpn.

    I thought she might have because the roads of local lan did not exist

    on the vpn 3000, so I added static to match the list of the network, but it

    still wouldn't go out, as soon as I activate the reverse road injection it

    works very well.

    any ideas?

    Thank you

    Adam Baxter.

    Adam,

    Take out the static routes and also injection Road opposite say-able.

    Activate the logs on the hub of gravity 1-13 for IPSEC & IPSECDBG, IKE, AUTH, IKEDBG, AUTHDBG.

    Try to send a ping to the interesting traffic. Capture logs and send them to this post, let me take a look and see if there is a question that jumps.

    See you soon

    Gilbert

  • Cisco ACS 5.4 and VPN 3000

    Hello

    I'm trying to use CIsco ACS 5.4 for RADIUS authentication for VPN by using VPN concentrator 3000 users.

    I added the VPN 3000 on ACS and added GBA on VPN group with a shared secret authentication server. When I do a test on the authentication server using the local account that I created on ACS it happens as no response was received from the server so that I can see the RAIDUS AAuth in green.

    Any help would be much appreciated.

    Concerning

    AR

    Hey,.

    What is the report on GBA?

    "RAIDUS AAuth in green"

    If so, a pcap help between the two.

    Concerning

    Ed

  • Console Cable - Cisco VPN 3000 Concentrator

    Where can I get a cable from the console to the Cisco VPN 3000 Concentrator? The place I bought the hub of not sent me one with it.

    Thank you

    JP

    JP,

    Console port for the concentrator vpn being complient rs-232, you can buy two female DB9 to RJ45 / adapters, one for the concetrator and one for the PC to use in the COM1 port, then use a regular straight through CAT5 cable, that's the way I do and it is convenient as suppose to use the straight through serial rs-232 cable.

    http://www.sealevel.com/product_detail.asp?product_id=787

    With regard to the regular cable this hub comes with you can use it.

    http://www.stonewallcable.com/product.asp?Dept%5Fid=35&PF%5Fid=SC%2DS9%2DFF

    Adidtional information for your initial hub seup -.

    http://www.Cisco.com/univercd/CC/TD/doc/product/VPN/vpn3000/3_6/getting/gs2inst.htm#1050260

    Concerning

    PLS rate useful posts

Maybe you are looking for