ASA Migration and choosing WAN IP for S2S

BillMcC
Here to help

ASA Migration and choosing WAN IP for S2S

Good morning all. I am about to migrate my existing MX100 firewalls over to MX105's. Along with this I will be moving all of my old site to site vpn's from an ASA. The ASA site to sites have  a different WAN Address than the Meraki's are using. I have a /28 block from our provider and all firewalls are using ip's from the same circuit. 

 

To ease the pain in migration I have all of the specs for the site to site migration except for the fact the remote side expects to see a specific wan ip. Some of these are connections to the state and systems I would have to track down a ton of information on. 

 

To the point. Is it possible to choose the wan ip on the MX105 that a specific site to site will use? I am afraid you guys are going to say no. But considering the weakness in Meraki's ability to route across VPN's I would not be surprised lol. 

 

Thanks!

4 Replies 4
Mloraditch
Kind of a big deal
Kind of a big deal

No that is not possible. The MX will only use the actual WAN IP or the HA IP (if you have that setup) of  the active primary WAN for 3rd party VPNs.

 

 

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
BillMcC
Here to help

Thanks Matthew! 

 

I have 5 VPN's to find out who the admins are for them lol. 

 

 

Mloraditch
Kind of a big deal
Kind of a big deal

You can also just move that IP to your MXs? Could be easier to update any whitelists vs the VPNs

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
PhilipDAth
Kind of a big deal
Kind of a big deal

Going sideways, the MX is not so strong with regard to non-Meraki site-to-site VPNs.

 

Have you thought about keeping the ASA for just these VPNs (no public IP change then), or moving them to something like StrongSwan running as a VM on an existing compute (I use StrongSwan a lot, it is free and very powerful).

There is also the virtual ASA option (such as the Cisco vASA 10).  The virtual option is going to be around for a long time yet.  If you want to go newer, there are also the virtual Firepower units, and the baby Firepower units (which can also run ASA - just copy and paste config) like the Firepower 1010.

 

https://www.cisco.com/c/en/us/products/collateral/security/adaptive-security-virtual-appliance-asav/...

 

https://www.cisco.com/c/en/us/products/collateral/security/firepower-ngfw-virtual/threat-defense-vir...

 

https://www.cisco.com/site/us/en/products/security/firewalls/firepower-1000-series/index.html

 

Get notified when there are additional replies to this discussion.