<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: L2TP on ASA software image on FPR1150 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261526#M1119600</link>
    <description>&lt;P&gt;This is requirement to connect two remote sites with L2TP which are connected over Sdwan, is it feasible without Public IP?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Feb 2025 17:53:46 GMT</pubDate>
    <dc:creator>KayaaKashyap</dc:creator>
    <dc:date>2025-02-17T17:53:46Z</dc:date>
    <item>
      <title>L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261421#M1119594</link>
      <description>&lt;P&gt;Hi Community,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for step by step guide to configure L2TP VPN on FPR1150 with ASA image on it.&lt;/P&gt;&lt;P&gt;Also what will be prerequisite?&lt;/P&gt;&lt;P&gt;Is it only possible over IPsec VPN?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 14:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261421#M1119594</guid>
      <dc:creator>KayaaKashyap</dc:creator>
      <dc:date>2025-02-17T14:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261435#M1119595</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1643055"&gt;@KayaaKashyap&lt;/a&gt; well the Cisco documents says the ASA supports L2TP for IKEv1/IPSec Remote Access VPN. However AnyConnect/Secure Client only supports IKEv2, not IKEv1. I assume you'd have to use the client OS built-in client (if supported).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa922/configuration/vpn/asa-922-vpn-config/vpn-l2tp-ipsec.html?bookSearch=true" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa922/configuration/vpn/asa-922-vpn-config/vpn-l2tp-ipsec.html?bookSearch=true&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 14:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261435#M1119595</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-17T14:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261526#M1119600</link>
      <description>&lt;P&gt;This is requirement to connect two remote sites with L2TP which are connected over Sdwan, is it feasible without Public IP?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 17:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261526#M1119600</guid>
      <dc:creator>KayaaKashyap</dc:creator>
      <dc:date>2025-02-17T17:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261532#M1119601</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1643055"&gt;@KayaaKashyap&lt;/a&gt; perhaps run VXLAN between the switches at the two sites over the tunnel.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 17:58:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261532#M1119601</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-17T17:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261533#M1119602</link>
      <description>&lt;P&gt;As per our client requirements, VXLAN is not much secure and client is looking for L2TP only.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 18:01:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261533#M1119602</guid>
      <dc:creator>KayaaKashyap</dc:creator>
      <dc:date>2025-02-17T18:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261534#M1119603</link>
      <description>&lt;P&gt;I remember that we suggest to ypu vxlan.&lt;/P&gt;
&lt;P&gt;Also why ypu want l2 tunnel between two site?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 18:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261534#M1119603</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-02-17T18:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261537#M1119604</link>
      <description>&lt;P&gt;This is functionality testing on their Pilot sites.&lt;/P&gt;&lt;P&gt;They want to test all possible/feasible functionality to implement it as per requirements.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 18:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261537#M1119604</guid>
      <dc:creator>KayaaKashyap</dc:creator>
      <dc:date>2025-02-17T18:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261538#M1119605</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1643055"&gt;@KayaaKashyap&lt;/a&gt; if the sites communicate using SDWAN then the traffic is encrypted, so whether it's VXLAN or L2TP communication is secure. You could run L2TP or VXLAN on the switches and just tunnel over the SDWAN.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 18:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261538#M1119605</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-17T18:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP on ASA software image on FPR1150</title>
      <link>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261601#M1119606</link>
      <description>&lt;P&gt;Ok' are there any l3 device behind ASA'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can end l2tp vpn in this device and bypass traffic through ASA.&lt;/P&gt;
&lt;P&gt;Only you need to open port for l2tp in asa' for bypass traffic.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 20:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2tp-on-asa-software-image-on-fpr1150/m-p/5261601#M1119606</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-02-17T20:33:31Z</dc:date>
    </item>
  </channel>
</rss>

