<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Encryption domain in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/encryption-domain/m-p/4075560#M1069572</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;The ASA uses access-lists to define the interesting traffic to be encrypted and transmitted over a VPN tunnel. Find the crypto map entry, then note the ACL being used to "match address", this references the ACL, E.g.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;crypto map MAP 10 match address &lt;STRONG&gt;SITE1_VPN&lt;BR /&gt;&lt;/STRONG&gt;&lt;BR /&gt;access-list &lt;STRONG&gt;SITE1_VPN&lt;/STRONG&gt; extended permit ip 10.20.0.0 255.255.252.0 10.10.0.0 255.255.252.0&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Apr 2020 12:58:37 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-04-28T12:58:37Z</dc:date>
    <item>
      <title>Encryption domain</title>
      <link>https://community.cisco.com/t5/network-security/encryption-domain/m-p/4075549#M1069569</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What command would I run on an ASA to show the encryption domain(s)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Troy&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 12:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/encryption-domain/m-p/4075549#M1069569</guid>
      <dc:creator>TroyBolton</dc:creator>
      <dc:date>2020-04-28T12:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption domain</title>
      <link>https://community.cisco.com/t5/network-security/encryption-domain/m-p/4075560#M1069572</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;The ASA uses access-lists to define the interesting traffic to be encrypted and transmitted over a VPN tunnel. Find the crypto map entry, then note the ACL being used to "match address", this references the ACL, E.g.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;crypto map MAP 10 match address &lt;STRONG&gt;SITE1_VPN&lt;BR /&gt;&lt;/STRONG&gt;&lt;BR /&gt;access-list &lt;STRONG&gt;SITE1_VPN&lt;/STRONG&gt; extended permit ip 10.20.0.0 255.255.252.0 10.10.0.0 255.255.252.0&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 12:58:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/encryption-domain/m-p/4075560#M1069572</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-04-28T12:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption domain</title>
      <link>https://community.cisco.com/t5/network-security/encryption-domain/m-p/4075599#M1069575</link>
      <description>&lt;P&gt;Several commands you can use, but the best one in my opinion is (where xxx.xxx.xxx.xxx is the public IP of the site to site peer):&lt;/P&gt;
&lt;P&gt;show crypto ipsec sa peer xxx.xxx.xxx.xxx&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 13:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/encryption-domain/m-p/4075599#M1069575</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-04-28T13:55:16Z</dc:date>
    </item>
  </channel>
</rss>

