<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Dynamic VPN policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791788#M1098589</link>
    <description>&lt;P&gt;Thank you, in command "crypto ikev1 policy 10",&amp;nbsp;&lt;BR /&gt;is 10 the priority&lt;/P&gt;</description>
    <pubDate>Sat, 11 Mar 2023 08:25:14 GMT</pubDate>
    <dc:creator>manvik</dc:creator>
    <dc:date>2023-03-11T08:25:14Z</dc:date>
    <item>
      <title>ASA Dynamic VPN policy</title>
      <link>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791766#M1098586</link>
      <description>&lt;P&gt;I have a DC ASA running Dynamic VPN tunnels. In the config I can see many&amp;nbsp;crypto ikev1 policy 1 - like&amp;nbsp;crypto ikev1 policy 10,&amp;nbsp;crypto ikev1 policy 20&lt;/P&gt;
&lt;P&gt;All has different DH group, hash etc.&lt;/P&gt;
&lt;P&gt;When a remote/branch device authenticates to this DC ASA, which policy would it choose.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 06:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791766#M1098586</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2023-03-11T06:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Dynamic VPN policy</title>
      <link>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791769#M1098587</link>
      <description>&lt;P&gt;show vpn-sessiondb l2l detail&amp;nbsp;&lt;BR /&gt;this can give you a hint about the IPsec encrypt/hash used&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 07:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791769#M1098587</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-11T07:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Dynamic VPN policy</title>
      <link>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791780#M1098588</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt; When the remote branch initiates the IKE negotiation, that peer sends all of its IKE policies to the remote peer (hub), and the remote peer tries to find a match. The remote peer checks all of the peer's policies against each of its configured policies in priority order (highest priority first) until it discovers a match. The lower the priority number, the higher the priority&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 07:57:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791780#M1098588</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-11T07:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Dynamic VPN policy</title>
      <link>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791788#M1098589</link>
      <description>&lt;P&gt;Thank you, in command "crypto ikev1 policy 10",&amp;nbsp;&lt;BR /&gt;is 10 the priority&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 08:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791788#M1098589</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2023-03-11T08:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Dynamic VPN policy</title>
      <link>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791790#M1098590</link>
      <description>&lt;P&gt;policy priority select the order of search, until now there is no way to find which policy Peer use except by using debug,&lt;BR /&gt;the issue is that phaseI ALL policies send in one message to peer, and Peer reply with accept one, and this can detect as I mention above via debug.&amp;nbsp;&lt;BR /&gt;sorry there is no any show help you in this case.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 08:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791790#M1098590</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-11T08:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Dynamic VPN policy</title>
      <link>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791793#M1098591</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt; yes&amp;nbsp; in your example 10 is the priority of the IKE policy. &lt;/P&gt;
&lt;P&gt;"show crypto ikev1 sa" (or "show crypto ikev2 sa" when using IKEv2) would help you determine what algorithms where used per peer to establish the IKE SA, it won't tell you which policy number was matched, but you'd be able to determine that yourself from the encryption, hashing, group etc in use.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 08:35:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dynamic-vpn-policy/m-p/4791793#M1098591</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-11T08:35:49Z</dc:date>
    </item>
  </channel>
</rss>

