<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic what do you see in the debugs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ios-ikev2-site-to-site-vpn-via-pki/m-p/2731270#M1049949</link>
    <description>&lt;P&gt;what do you see in the debugs?&lt;/P&gt;</description>
    <pubDate>Mon, 07 Sep 2015 01:23:17 GMT</pubDate>
    <dc:creator>pjain2</dc:creator>
    <dc:date>2015-09-07T01:23:17Z</dc:date>
    <item>
      <title>ASA-IOS IKEv2 site-to-site VPN via PKI</title>
      <link>https://community.cisco.com/t5/network-security/asa-ios-ikev2-site-to-site-vpn-via-pki/m-p/2731268#M1049947</link>
      <description>&lt;P&gt;I have been trying to implement IKEv2 site-to-site VPN via PKI between ASA 8.4 &amp;amp; IOS 15.2(4)S5 for many days but still tunnel is not coming up... if anyone has any idea or configuration example please do share it... my configurations are as follows...&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;ASA's Configuration:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;ip domain name cisco.local&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;crypto key generate rsa general-keys label CA-KEY modulus 1024&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ROOT-CA&lt;BR /&gt;&amp;nbsp;enrollment url &lt;A href="http://1.1.1.1:80" target="_blank"&gt;http://1.1.1.1:80&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;keypair CA-KEY&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha512&lt;BR /&gt;&amp;nbsp;group 5&lt;BR /&gt;&amp;nbsp;prf sha512&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;access-list 110 extended permit ip 10.10.10.0 255.255.255.0 10.10.20.0 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;group-policy IKEv2-POLICY internal&lt;BR /&gt;group-policy IKEv2-POLICY attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt;tunnel-group 192.168.1.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 192.168.1.1 general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy IKEv2-POLICY&lt;BR /&gt;tunnel-group 192.168.1.1 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev2 remote-authentication certificate&lt;BR /&gt;&amp;nbsp;ikev2 local-authentication certificate ROOT-CA&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal IKEv2-PROPOSAL&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map IKEv2-MAP 10 match address 110&lt;BR /&gt;crypto map IKEv2-MAP 10 set peer 192.168.2.1&lt;BR /&gt;crypto map IKEv2-MAP 10 set ikev2 ipsec-proposal IKEv2-PROPOSAL&lt;BR /&gt;crypto map IKEv2-MAP 10 set trustpoint ROOT-CA&lt;BR /&gt;crypto map IKEv2-MAP interface outside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Router's Configuration:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;crypto key generate rsa general-keys label CA-KEY modulus 1024&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ip domain name cisco.local&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint ROOT-CA&lt;BR /&gt;&amp;nbsp;enrollment url &lt;A href="http://1.1.1.1" target="_blank"&gt;http://1.1.1.1&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair CA-KEY&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ntp authentication-key 1 md5 cisco&lt;BR /&gt;ntp authenticate&lt;BR /&gt;ntp trusted-key 1&lt;BR /&gt;ntp server 1.1.1.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate map CERT-MAP 10&lt;BR /&gt;&amp;nbsp;issuer-name co root-ca&lt;BR /&gt;!&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 proposal IKEv2-PROPOSAL&amp;nbsp;&lt;BR /&gt;&amp;nbsp;encryption aes-cbc-256&lt;BR /&gt;&amp;nbsp;integrity sha512&lt;BR /&gt;&amp;nbsp;group 5&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 policy IKEv2-POLICY&amp;nbsp;&lt;BR /&gt;&amp;nbsp;match address local 192.168.2.1&lt;BR /&gt;&amp;nbsp;proposal IKEv2-PROPOSAL&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 profile IKEv2-PROFILE&lt;BR /&gt;&amp;nbsp;match address local 192.168.2.1&lt;BR /&gt;&amp;nbsp;match identity remote address 192.168.1.1 255.255.255.255&amp;nbsp;&lt;BR /&gt;&amp;nbsp;match certificate CERT-MAP&lt;BR /&gt;&amp;nbsp;identity local dn&amp;nbsp;&lt;BR /&gt;&amp;nbsp;authentication remote rsa-sig&lt;BR /&gt;&amp;nbsp;authentication local rsa-sig&lt;BR /&gt;&amp;nbsp;pki trustpoint ROOT-CA&lt;BR /&gt;!&lt;BR /&gt;no crypto ikev2 http-url cert&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set IKEv2-SET esp-aes esp-sha-hmac&amp;nbsp;&lt;BR /&gt;&amp;nbsp;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map IKEv2-MAP 10 ipsec-isakmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;set peer 192.168.1.1&lt;BR /&gt;&amp;nbsp;set transform-set IKEv2-SET&amp;nbsp;&lt;BR /&gt;&amp;nbsp;set pfs group2&lt;BR /&gt;&amp;nbsp;set ikev2-profile IKEv2-PROFILE&lt;BR /&gt;&amp;nbsp;match address 110&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;access-list 110 extended permit ip 10.10.20.0 255.255.255.0 10.10.10.0 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ios-ikev2-site-to-site-vpn-via-pki/m-p/2731268#M1049947</guid>
      <dc:creator>sirbulandkhan1</dc:creator>
      <dc:date>2020-02-21T13:33:15Z</dc:date>
    </item>
    <item>
      <title>Hi there, The below URL may</title>
      <link>https://community.cisco.com/t5/network-security/asa-ios-ikev2-site-to-site-vpn-via-pki/m-p/2731269#M1049948</link>
      <description>&lt;P&gt;Hi there,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below URL may assist you (it discribes ASA-to-ASA L-2-L VPN using PKI):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://itzecurity.blogspot.com.eg/2014/02/cisco-asa-ikev2-pki-site-site-vpn.html"&gt;http://itzecurity.blogspot.com.eg/2014/02/cisco-asa-ikev2-pki-site-site-vpn.html&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have already sorted it out, please share your resolution.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2015 05:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ios-ikev2-site-to-site-vpn-via-pki/m-p/2731269#M1049948</guid>
      <dc:creator>hazem.shoeib</dc:creator>
      <dc:date>2015-09-06T05:32:13Z</dc:date>
    </item>
    <item>
      <title>what do you see in the debugs</title>
      <link>https://community.cisco.com/t5/network-security/asa-ios-ikev2-site-to-site-vpn-via-pki/m-p/2731270#M1049949</link>
      <description>&lt;P&gt;what do you see in the debugs?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2015 01:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ios-ikev2-site-to-site-vpn-via-pki/m-p/2731270#M1049949</guid>
      <dc:creator>pjain2</dc:creator>
      <dc:date>2015-09-07T01:23:17Z</dc:date>
    </item>
  </channel>
</rss>

