<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Just want to practice with in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/setting-ccp-with-asa-5585x/m-p/2695986#M193968</link>
    <description>&lt;P&gt;Just want to practice with CCP and looking devices that I can use here at work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Marvin. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jul 2015 19:06:41 GMT</pubDate>
    <dc:creator>Shao-Yu Chen</dc:creator>
    <dc:date>2015-07-15T19:06:41Z</dc:date>
    <item>
      <title>Setting CCP with ASA 5585X</title>
      <link>https://community.cisco.com/t5/network-security/setting-ccp-with-asa-5585x/m-p/2695984#M193960</link>
      <description>&lt;P&gt;APHA-ASA5585VPN# sh run | inc crypto pki&lt;BR /&gt;APHA-ASA5585VPN# sh run | inc crypto&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint VPN_TrustPoint&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;BR /&gt;crypto ca trustpoint ASDM_VPNTrustPoint&lt;BR /&gt;crypto ca trustpoint VPNTrustPoint&lt;BR /&gt;crypto ca trustpoint VPNTrustPoint2&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt;crypto ca certificate chain ASDM_VPNTrustPoint&lt;BR /&gt;crypto ca certificate chain VPNTrustPoint&lt;BR /&gt;crypto isakmp identity hostname&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;&amp;nbsp; add-command "show crypto ipsec sa"&lt;BR /&gt;&amp;nbsp; add-command "show crypto isakmp sa"&lt;BR /&gt;&amp;nbsp; add-command "show crypto protocol statistics all"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Base on above show run, there is no crypto pki running on this device. I am not able to pick up self signed crypto key from this device, and I believe it is required for CCP to connect.&lt;/P&gt;&lt;P&gt;If I enable crypto key gen rsa, what kind of impact will I do to our VPN users? This ASA device is only doing VPN service at this point. Will I mess up our VPN certificates?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you answering my questions.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-ccp-with-asa-5585x/m-p/2695984#M193960</guid>
      <dc:creator>Shao-Yu Chen</dc:creator>
      <dc:date>2019-03-12T06:14:30Z</dc:date>
    </item>
    <item>
      <title>Assuming your asking about</title>
      <link>https://community.cisco.com/t5/network-security/setting-ccp-with-asa-5585x/m-p/2695985#M193964</link>
      <description>&lt;P&gt;Assuming you're asking about the Cisco Configuration Professional type of CCP....&lt;/P&gt;&lt;P&gt;That CCP is only for router configuration and will not work with ASAs of any kind. The GUI for managing an ASA is ASDM (Adaptive Security Device Manager). There is a certificate for ASDM as indicated by "ASDM_TrustPoint0"&amp;nbsp;in your output above..&lt;/P&gt;&lt;P&gt;Even if you didn't have any certificate configured, the ASDM would have generated a self-signed ephemeral one when it booted up and initialized.&lt;/P&gt;&lt;P&gt;You should point your browser to an interface permitted for management (as indicated by the "http" command in your configuration) and specify &lt;A href="https://&amp;lt;interface" target="_blank"&gt;https://&amp;lt;interface&lt;/A&gt; address or fqdn&amp;gt;/admin to launch ASDM and optionally download the desktop client (a Java applet).&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 02:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-ccp-with-asa-5585x/m-p/2695985#M193964</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-09T02:11:19Z</dc:date>
    </item>
    <item>
      <title>Just want to practice with</title>
      <link>https://community.cisco.com/t5/network-security/setting-ccp-with-asa-5585x/m-p/2695986#M193968</link>
      <description>&lt;P&gt;Just want to practice with CCP and looking devices that I can use here at work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Marvin. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 19:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-ccp-with-asa-5585x/m-p/2695986#M193968</guid>
      <dc:creator>Shao-Yu Chen</dc:creator>
      <dc:date>2015-07-15T19:06:41Z</dc:date>
    </item>
  </channel>
</rss>

