I understand Shaughn. It wasn't a dig. Much respects go to you.....
--Hammer--
On 10/6/2010 2:41 PM, Shaughn Smith wrote:
> At the end of the day it's the customers decision. They are pretty
> entrenched with Cisco (a couple hundred devices) so for them to move
> to another Vendor isnt going to happen.
>
> Thanks for the comments gents.
>
> CCIE # 23962 (SP)
>
> On Wed, Oct 6, 2010 at 9:27 PM, --Hammer-- <bhmccie_at_gmail.com
> <mailto:bhmccie_at_gmail.com>> wrote:
>
> Design for the customer. Not for the vendor.
>
> We flipped to CheckPoint to fix this. I'm just sayin'....
>
> --Hammer--
>
>
>
> On 10/6/2010 2:21 PM, Marcelo Pinheiro wrote:
>
> You cannot have VPNs on a context mode firewall...no license
> will solve your
> issue (up to date).
>
> On Wed, Oct 6, 2010 at 4:11 PM, Shaughn
> Smith<maniac.smg_at_gmail.com <mailto:maniac.smg_at_gmail.com>> wrote:
>
> I wouldnt mind putting in a checkpoint but the client is a
> Cisco house.
>
> Any way around this issue ? Are they going to have to pay
> for new licensing
> ?
>
> On Wed, Oct 6, 2010 at 9:09 PM, Joseph L. Brunner
> <joe_at_affirmedsystems.com
> <mailto:joe_at_affirmedsystems.com>>wrote:
>
> Crypto not allowed partner...
>
> Sorry...
>
> Time for a checkpoint
>
> -----Original Message-----
> From: nobody_at_groupstudy.com
> <mailto:nobody_at_groupstudy.com>
> [mailto:nobody_at_groupstudy.com
> <mailto:nobody_at_groupstudy.com>] On Behalf Of
> Shaughn Smith
> Sent: Wednesday, October 06, 2010 3:06 PM
> To: Cisco certification
> Subject: ASA 5550 question
>
> Hi All
>
> I have a Cisco ASA 5550 running which in turn is
> running 3 contexts.
>
> Everything has been running smoothly but now the
> client is asking for
>
> Ipsec
>
> remote access VPN's.
>
> I have no issue configuring this as i have done it 100
> times before,
> however
> when i type the crypto ipsec command i get this as an
> option
>
> Fxxxxt(config)# crypto ?
>
> configure mode commands/options:
> ca Certification authority
> key Long term key operations
>
> ie IPSEC is not supported. Now i dont know if this is
> a licencing issue
>
> or
>
> an actual software version
>
> Here is the SH VER output
>
> icensed features for this platform:
> Maximum Physical Interfaces : Unlimited
> Maximum VLANs : 250
> Inside Hosts : Unlimited
> Failover : Active/Active
> VPN-DES : Enabled
> VPN-3DES-AES : Enabled
> Security Contexts : 2
> GTP/GPRS : Disabled
> SSL VPN Peers : 2
> Total VPN Peers : 5000
> Shared License : Disabled
> AnyConnect for Mobile : Disabled
> AnyConnect for Linksys phone : Disabled
> AnyConnect Essentials : Disabled
> Advanced Endpoint Assessment : Disabled
> UC Phone Proxy Sessions : 2
> Total UC Proxy Sessions : 2
> Botnet Traffic Filter : Disabled
>
> This platform has an ASA 5550 VPN Premium license.
>
> Says 3DES-AES is enabled but that might be for SSL
> VPN's. I have really
> done
> any research yet but sure it has to do with the VPN
> Premium licence.
>
> Thanks
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Wed Oct 06 2010 - 14:42:45 ART
This archive was generated by hypermail 2.2.0 : Mon Nov 01 2010 - 06:42:05 ART