<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN links in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-links/m-p/2984066#M149427</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;How can i configure a 4 VPN links with VLAN for each link on the same Physical interface in ASA 5512-x ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks in advance&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:21:59 GMT</pubDate>
    <dc:creator>moussa.malqui1</dc:creator>
    <dc:date>2019-03-12T08:21:59Z</dc:date>
    <item>
      <title>VPN links</title>
      <link>https://community.cisco.com/t5/network-security/vpn-links/m-p/2984066#M149427</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;How can i configure a 4 VPN links with VLAN for each link on the same Physical interface in ASA 5512-x ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:21:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-links/m-p/2984066#M149427</guid>
      <dc:creator>moussa.malqui1</dc:creator>
      <dc:date>2019-03-12T08:21:59Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/vpn-links/m-p/2984067#M149428</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can use subinterfaces on ASA and encapsulation for each vlan you want. You can do it based on the following example:&lt;/P&gt;
&lt;DIV class="entry-content" itemprop="text"&gt;
&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt; !&lt;BR /&gt; interface GigabitEthernet0/0.10&lt;BR /&gt; description outside1&lt;BR /&gt; vlan 10&lt;BR /&gt; nameif out1&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0&lt;BR /&gt; !&lt;BR /&gt; interface GigabitEthernet0/0.20&lt;BR /&gt; description outside2&lt;BR /&gt; vlan 20&lt;BR /&gt; nameif out2&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address 10.20.20.1 255.255.255.0&lt;BR /&gt; !&lt;/P&gt;
&lt;P&gt;Then you can configure IPSEC for evey subinterface by using the following link instructions:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/119141-configure-asa-00.html#anc8&lt;/P&gt;
&lt;P&gt;Note: You can create a crypto map for every interface after you enable ikev1 on interface&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 07 Oct 2016 20:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-links/m-p/2984067#M149428</guid>
      <dc:creator>soulasmarios</dc:creator>
      <dc:date>2016-10-07T20:07:13Z</dc:date>
    </item>
  </channel>
</rss>

