<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5506 - PPPoE configuration and S2S VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-pppoe-configuration-and-s2s-vpn/m-p/4138784#M1073168</link>
    <description>&lt;P&gt;ASA support IPsec / L2TP over PPPoE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a sample configuration for Site A (static IP) , Site B (Dynamic IP from PPPoE link) :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Site A :&lt;/P&gt;
&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;BR /&gt;crypto dynamic-map cisco 1 set transform-set myset &lt;BR /&gt;crypto map dyn-map 20 ipsec-isakmp dynamic cisco &lt;BR /&gt;crypto map dyn-map interface outside &lt;BR /&gt;crypto isakmp enable outside &lt;BR /&gt;authentication pre-share &lt;BR /&gt;encryption des &lt;BR /&gt;hash md5 &lt;BR /&gt;group 2 &lt;BR /&gt;tunnel-group DefaultL2LGroup type ipsec-l2l&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Site B :&lt;/P&gt;
&lt;P&gt;acl for the interesting traffic(access-list 100 extended permit ip 10.2.2.0 255.255.255.0 10.1.1.0 255.255.255.0)&lt;BR /&gt;&lt;BR /&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;BR /&gt;crypto map newmap 10 match address 100 &lt;BR /&gt;crypto map newmap 10 set peer 172.18.124.166 &lt;BR /&gt;crypto map newmap 10 set transform-set myset &lt;BR /&gt;crypto map newmap interface outside &lt;BR /&gt;crypto isakmp enable outside &lt;BR /&gt;isakmp policy 10 &lt;BR /&gt;authentication pre-share &lt;BR /&gt;encryption 3des &lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;tunnel-group (peer's ip address) type ipsec l2l&lt;BR /&gt;tunnel-group (peer's ip address) ipsec attributes&lt;BR /&gt;pre-shared key *******.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="con-NoMargin hist-break-word"&gt;Please make sure to change the parameters and policies as per your requirment.
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding your question about Site B ASA , what default route it needs.&lt;/P&gt;
&lt;P&gt;the outside interface will pick an IP based on DHCP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the default route should point to a specific IP that should be provided by the ISP, or you could find that out by issuing "sh arp" and see what is directly connected to the ASA on the outside interface, and then specify that IP as your GW.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Aug 2020 13:44:04 GMT</pubDate>
    <dc:creator>malkhati</dc:creator>
    <dc:date>2020-08-20T13:44:04Z</dc:date>
    <item>
      <title>Cisco ASA 5506 - PPPoE configuration and S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-pppoe-configuration-and-s2s-vpn/m-p/4136976#M1073056</link>
      <description>&lt;P&gt;Dear Friends,&lt;/P&gt;&lt;P&gt;I am new to PPPoE configuration and hence this query.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have an IPSec S2S VPN built between SiteA and SiteB. So, the ISP at SITE B is now providing us with a PPPoE connection. They provided us a router with a Public IP and also provided us with a username and password. ( I read and understood that these credentials are used for configuring a PPPoE client.). They didn't provide me with a default gateway or a public IP for my ASA ( So, I also understood from PPPoE documents that we won't be provided those details).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My query here is.. If I dont have a public IP and a public default gateway on my ASA, how would I establish my S2S VPN with SiteA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did some research and I think I need to remove the ISP provided router and configure the public IP on the ASA directly, but still am confused if this is the right procedure and also using this command:&amp;nbsp;&lt;/P&gt;&lt;P&gt;#ip address pppoe setroute would automatically set a default gateway. and if thats the case, do I still need the ip route 0.0.0.0 0.0.0.0 &amp;lt;default Gateway&amp;gt; command on my ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Request you to share your valuable suggestions to make this configuration work for me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Aug 2020 16:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-pppoe-configuration-and-s2s-vpn/m-p/4136976#M1073056</guid>
      <dc:creator>Deepthi</dc:creator>
      <dc:date>2020-08-17T16:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 - PPPoE configuration and S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-pppoe-configuration-and-s2s-vpn/m-p/4138784#M1073168</link>
      <description>&lt;P&gt;ASA support IPsec / L2TP over PPPoE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a sample configuration for Site A (static IP) , Site B (Dynamic IP from PPPoE link) :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Site A :&lt;/P&gt;
&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;BR /&gt;crypto dynamic-map cisco 1 set transform-set myset &lt;BR /&gt;crypto map dyn-map 20 ipsec-isakmp dynamic cisco &lt;BR /&gt;crypto map dyn-map interface outside &lt;BR /&gt;crypto isakmp enable outside &lt;BR /&gt;authentication pre-share &lt;BR /&gt;encryption des &lt;BR /&gt;hash md5 &lt;BR /&gt;group 2 &lt;BR /&gt;tunnel-group DefaultL2LGroup type ipsec-l2l&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Site B :&lt;/P&gt;
&lt;P&gt;acl for the interesting traffic(access-list 100 extended permit ip 10.2.2.0 255.255.255.0 10.1.1.0 255.255.255.0)&lt;BR /&gt;&lt;BR /&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;BR /&gt;crypto map newmap 10 match address 100 &lt;BR /&gt;crypto map newmap 10 set peer 172.18.124.166 &lt;BR /&gt;crypto map newmap 10 set transform-set myset &lt;BR /&gt;crypto map newmap interface outside &lt;BR /&gt;crypto isakmp enable outside &lt;BR /&gt;isakmp policy 10 &lt;BR /&gt;authentication pre-share &lt;BR /&gt;encryption 3des &lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;tunnel-group (peer's ip address) type ipsec l2l&lt;BR /&gt;tunnel-group (peer's ip address) ipsec attributes&lt;BR /&gt;pre-shared key *******.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="con-NoMargin hist-break-word"&gt;Please make sure to change the parameters and policies as per your requirment.
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding your question about Site B ASA , what default route it needs.&lt;/P&gt;
&lt;P&gt;the outside interface will pick an IP based on DHCP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the default route should point to a specific IP that should be provided by the ISP, or you could find that out by issuing "sh arp" and see what is directly connected to the ASA on the outside interface, and then specify that IP as your GW.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2020 13:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-pppoe-configuration-and-s2s-vpn/m-p/4138784#M1073168</guid>
      <dc:creator>malkhati</dc:creator>
      <dc:date>2020-08-20T13:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 - PPPoE configuration and S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-pppoe-configuration-and-s2s-vpn/m-p/4138822#M1073171</link>
      <description>&lt;P&gt;Hi Malkhati,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much for your valuable reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I now understand the configuration of SiteA (Static IP) and SiteB (PPPoE) where SiteB acquires the IP via DHCP.&lt;/P&gt;&lt;P&gt;So, I would like to know if we can make SiteB(PPPoE) have a static IP and then use a default gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was browsing the internet and found this article. It it be very helpful to me if you could take a look at it and see if this configuration where the obtained a static IP (PPPoE) from ISP and completed the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0000831" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0000831&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2020 14:27:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-pppoe-configuration-and-s2s-vpn/m-p/4138822#M1073171</guid>
      <dc:creator>Deepthi</dc:creator>
      <dc:date>2020-08-20T14:27:37Z</dc:date>
    </item>
  </channel>
</rss>

