http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/c
ontexts.html#wp1116132
-----Original Message-----
From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of
Carlos G Mendioroz
Sent: Wednesday, October 06, 2010 1:18 PM
To: Joseph L. Brunner
Cc: 'rwest_at_zyedge.com'; 'maniac.smg_at_gmail.com'; 'ccielab_at_groupstudy.com'
Subject: Re: ASA 5550 question
Joseph,
would you please elaborate on why is it not feasible to do it ?
If the interfaces are dedicated, there is no issue, right ?
If there is a common interface, and different IPs/MACs on the contexts, 
I see no problem either. You might, as cisco, require different IPs to 
enable VPN... or am I missing something ?
BTW, what's the problem with talking jackets ? :)
-Carlos
Joseph L. Brunner @ 6/10/2010 16:30 -0300 dixit:
> Not realistic or possible given the multi-context packet routing
engine between the interfaces and context forwarding.
> 
> I assume we'll be waiting for that Ryan until we get our Auto-lacing
nike's and self-drying/adjusting jackets that talk to us in 2015.
> 
> 
> This is one of a thousand reasons the biggest most complex
environments use checkpoint or juniper netscreen.
> 
> Joe
> 
> 
> ----- Original Message -----
> From: Ryan West <rwest_at_zyedge.com>
> To: Joseph L. Brunner; Shaughn Smith <maniac.smg_at_gmail.com>; Cisco
certification <ccielab_at_groupstudy.com>
> Sent: Wed Oct 06 15:12:37 2010
> Subject: RE: ASA 5550 question
> 
> Wait for the next release :) RA / L2L in multi context due *soon*
> 
> -ryan
> 
> -----Original Message-----
> From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf
Of Joseph L. Brunner
> Sent: Wednesday, October 06, 2010 3:09 PM
> To: Shaughn Smith; Cisco certification
> Subject: RE: ASA 5550 question
> 
> Crypto not allowed partner...
> 
> Sorry...
> 
> Time for a checkpoint
> 
> -----Original Message-----
> From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf
Of Shaughn Smith
> Sent: Wednesday, October 06, 2010 3:06 PM
> To: Cisco certification
> Subject: ASA 5550 question
> 
> Hi All
> 
> I have a Cisco ASA 5550 running which in turn is running 3 contexts.
> 
> Everything has been running smoothly but now the client is asking for
Ipsec remote access VPN's.
> 
> I have no issue configuring this as i have done it 100 times before,
however when i type the crypto ipsec command i get this as an option
> 
> Fxxxxt(config)# crypto ?
> 
> configure mode commands/options:
>   ca   Certification authority
>   key  Long term key operations
> 
> ie IPSEC is not supported. Now i dont know if this is a licencing
issue or an actual software version
> 
> Here is the SH VER output
> 
> icensed features for this platform:
> Maximum Physical Interfaces  : Unlimited
> Maximum VLANs                : 250
> Inside Hosts                 : Unlimited
> Failover                     : Active/Active
> VPN-DES                      : Enabled
> VPN-3DES-AES                 : Enabled
> Security Contexts            : 2
> GTP/GPRS                     : Disabled
> SSL VPN Peers                : 2
> Total VPN Peers              : 5000
> Shared License               : Disabled
> AnyConnect for Mobile        : Disabled
> AnyConnect for Linksys phone : Disabled
> AnyConnect Essentials        : Disabled
> Advanced Endpoint Assessment : Disabled
> UC Phone Proxy Sessions      : 2
> Total UC Proxy Sessions      : 2
> Botnet Traffic Filter        : Disabled
> 
> This platform has an ASA 5550 VPN Premium license.
> 
> Says 3DES-AES is enabled but that might be for SSL VPN's. I have
really done any research yet but sure it has to do with the VPN Premium
licence.
> 
> Thanks
> 
> 
> Blogs and organic groups at http://www.ccie.net
> 
>
Received on Wed Oct 06 2010 - 14:04:55 ART
This archive was generated by hypermail 2.2.0 : Mon Nov 01 2010 - 06:42:05 ART