- Community Home
- >
- Networking
- >
- Security e-Series
- >
- Multiple Site-to-Site IPSec VPN configuration betw...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-17-2014 11:31 PM
01-17-2014 11:31 PM
Multiple Site-to-Site IPSec VPN configuration between H3C Secpath F1000e and Cisco ASA
Dear All,
Good Day!
I have a H3C Secpath F1000e where I have client IPSec VPN (IPSec with L2TP) configured and running fine. Now I have a requirement to run an IPSec tunnel between Cisco ASA and my firewall. As I have 1 external interface and I cannot apply multiple IPsec policies on the interface, I tried creating a IPsec policy with sequence numbers.
Seq. no. 1 being site-2-site IPsec **
Seq. no. 2 being client IPSec VPN (Inode) **
** both IKE peers have different Pre-Shared Keys
Now, I applied the newly created IPsec policy with above seq. and when I try to connect the inode client it fails in IKE nego.
Then seq. reordered as below.
Seq. no. 1 being client IPSec VPN (Inode) **
Seq. no. 2 being site-2-site IPsec **
Now, i was able to connect the VPN using inode. But site-2-site IPSec was failing with IKE PSK mismatch. Having doubt that PSK refered in my fw would be of Client VPN peer, we removed the client VPN config and enabled only site-2-site VPN.
Seq. no. 1 being site-2-site IPsec **
Now, IKE and IPsec went thru. But we had some issues in passing the traffic thru the IPsec tunnel with following error.
Help Required
1. We need to have both client VPN(Inode) and Site-2-Site VPN (2 locations as of now) co-existing.
2. Interesting traffic should pass thru the IPsec tunnel.
Thanks for reading my issue.
-D Jaison