<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ikev2 remote-authentication and ikev2 local-authentication in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010720#M31414</link>
    <description>&lt;P&gt;I am asking for L2L VPN with a 3rd party Vendor like Checkpoint or Palo Alto&lt;/P&gt;</description>
    <pubDate>Mon, 13 Jan 2020 19:30:10 GMT</pubDate>
    <dc:creator>ravindra962</dc:creator>
    <dc:date>2020-01-13T19:30:10Z</dc:date>
    <item>
      <title>ikev2 remote-authentication and ikev2 local-authentication</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010716#M31366</link>
      <description>&lt;P&gt;Hello Guys&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am kind of New to Cisco ASA. I Used to configure VPN tunnels in Checkpoint, but there used to be Only one PSK.&lt;/P&gt;&lt;P&gt;With Cisco 9.8 ASA Code you can put two PSK's for local and remote. I understood how these two PSK's work with bi-directional authentication.&lt;/P&gt;&lt;P&gt;Here what I am wondering is, If I am building a L2L VPN tunnel where both the peers are Cisco ASA, I can use two different PSK's for local and remote authentication but if the other Peer is not an ASA (Checkpoint, Paloalto etc) then does both (local and remote) the PSK&amp;nbsp; has to be same?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 19:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010716#M31366</guid>
      <dc:creator>ravindra962</dc:creator>
      <dc:date>2020-01-13T19:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: ikev2 remote-authentication and ikev2 local-authentication</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010719#M31392</link>
      <description>&lt;P&gt;if you asking for l2l vpn with ikev2 yes you can mix match the local pre-shared key and remote-preshared key. I am not following you are you asking for anyconnect vpn or asking for l2l site to site vpn&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 19:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010719#M31392</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-13T19:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: ikev2 remote-authentication and ikev2 local-authentication</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010720#M31414</link>
      <description>&lt;P&gt;I am asking for L2L VPN with a 3rd party Vendor like Checkpoint or Palo Alto&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 19:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010720#M31414</guid>
      <dc:creator>ravindra962</dc:creator>
      <dc:date>2020-01-13T19:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: ikev2 remote-authentication and ikev2 local-authentication</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010724#M31431</link>
      <description>&lt;P&gt;on cisco ASA with l2l ikev1 there is only one pre-shared-key. however with ikev2 l2l you can configured a local pre-shared key and remote preshared key. other thing for ikev2 pre-share-key local and remote keys can be different. they dont need to be the same. however you have to make sure on the other side its Vic-versa.&lt;/P&gt;
&lt;P&gt;see this example for ikev2 site-to-site vpn &lt;A href="https://www.petenetlive.com/KB/Article/0001429" target="_blank" rel="noopener"&gt;https://www.petenetlive.com/KB/Article/0001429&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 19:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010724#M31431</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-13T19:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: ikev2 remote-authentication and ikev2 local-authentication</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010726#M31445</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Very much for providing such a detailed explanation.&lt;/P&gt;&lt;P&gt;My question is, for example let's Say I am building a ikev2 L2L VPN tunnel between my Peer which is a Cisco ASA and my client peer which is a Checkpoint&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now if i Configure the local and Remote PSK's on my ASA I need to give these PSK's to my Client so that they can configure this PSK's&amp;nbsp; on their end. If my local and Remote PSK's are different which PSK should I share with my client so that the Phase-1 authentication will be successful because I know for sure on checkpoint you can enter only one PSK per L2L VPN tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;PetesASA(config-tunnel-ipsec)# &lt;SPAN&gt;remote-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;
PetesASA(config-tunnel-ipsec)# &lt;SPAN&gt;local-authentication pre-shared-key 0987654321&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 19:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010726#M31445</guid>
      <dc:creator>ravindra962</dc:creator>
      <dc:date>2020-01-13T19:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: ikev2 remote-authentication and ikev2 local-authentication</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010736#M31453</link>
      <description>&lt;P&gt;you have to give local and remote pre-share-key to remote site. if this is a security concern why dont you use the certificate?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;let say this is your config&lt;/P&gt;
&lt;PRE&gt;ASA(config-tunnel-ipsec)# &lt;SPAN&gt;remote-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;
ASA(config-tunnel-ipsec)# &lt;SPAN&gt;local-authentication pre-shared-key 0987654321&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;now your remote site have config like this&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ASA(config-tunnel-ipsec)# &lt;SPAN&gt;remote-authentication pre-shared-key 0987654321&lt;/SPAN&gt;
ASA(config-tunnel-ipsec)# &lt;SPAN&gt;local-authentication pre-shared-key &lt;SPAN class="ASA_RED"&gt;1234567890&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 13 Jan 2020 20:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010736#M31453</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-13T20:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: ikev2 remote-authentication and ikev2 local-authentication</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010741#M31462</link>
      <description>&lt;P&gt;It's not about Security Concern, in checkpoint you do not have an option to Put a Local PSK and Remote PSK. You can only put one PSK. So I just want to know if I have to use same PSK for both Local and Remote&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 20:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010741#M31462</guid>
      <dc:creator>ravindra962</dc:creator>
      <dc:date>2020-01-13T20:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: ikev2 remote-authentication and ikev2 local-authentication</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010745#M31467</link>
      <description>&lt;P&gt;for ikev2 you can use the same preshared key for local and remote authentication.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 20:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-remote-authentication-and-ikev2-local-authentication/m-p/4010745#M31467</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-13T20:33:26Z</dc:date>
    </item>
  </channel>
</rss>

