<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPsec L2L tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-l2l-tunnel/m-p/2466476#M267300</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Hi..&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have cisco ASA version 8.4,i am settingup a L2L IPSec tunnel with our client. Client too has ASA. I have disable AM&amp;nbsp;mode on my end ASA.&lt;/P&gt;&lt;P&gt;Does AM need to be disable on client end ASA to&amp;nbsp; get the negotiation happen b/w ASAs&amp;nbsp;and tunnel up and working.&lt;/P&gt;&lt;P&gt;Pls help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:07:21 GMT</pubDate>
    <dc:creator>Anukalp S</dc:creator>
    <dc:date>2019-03-12T04:07:21Z</dc:date>
    <item>
      <title>IPsec L2L tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-l2l-tunnel/m-p/2466476#M267300</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Hi..&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have cisco ASA version 8.4,i am settingup a L2L IPSec tunnel with our client. Client too has ASA. I have disable AM&amp;nbsp;mode on my end ASA.&lt;/P&gt;&lt;P&gt;Does AM need to be disable on client end ASA to&amp;nbsp; get the negotiation happen b/w ASAs&amp;nbsp;and tunnel up and working.&lt;/P&gt;&lt;P&gt;Pls help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-l2l-tunnel/m-p/2466476#M267300</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2019-03-12T04:07:21Z</dc:date>
    </item>
    <item>
      <title>Hello, I would say No just</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-l2l-tunnel/m-p/2466477#M267302</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would say No just make sure the client is using Main mode to connect &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Sat, 26 Apr 2014 05:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-l2l-tunnel/m-p/2466477#M267302</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-04-26T05:32:26Z</dc:date>
    </item>
    <item>
      <title>Main mode is the default</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-l2l-tunnel/m-p/2466478#M267304</link>
      <description>&lt;P&gt;Main mode is the default selection on Cisco ASA.&lt;/P&gt;&lt;P&gt;By default on Cisco ASA, IKE runs in aggressive mode for only remote-access VPNs using preshared-key authentication, and this is a requirement for the connection to be successful due to the identity-matching mechanism.&lt;/P&gt;&lt;P&gt;If no changes has been done on your client side then default selection for IKE negotiation will be Main mode.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Apr 2014 06:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-l2l-tunnel/m-p/2466478#M267304</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-04-26T06:46:35Z</dc:date>
    </item>
  </channel>
</rss>

