<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 support  ipsec site to site vpn by domain name way ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-support-ipsec-site-to-site-vpn-by-domain-name-way/m-p/2345668#M345429</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp; hi Marius, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; thank you very much for your help ,i will&amp;nbsp; act&amp;nbsp; to do it .&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; best regards&lt;/P&gt;&lt;P&gt;&amp;nbsp; wang yi lun &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 10 Aug 2013 08:19:31 GMT</pubDate>
    <dc:creator>wangyilunwww</dc:creator>
    <dc:date>2013-08-10T08:19:31Z</dc:date>
    <item>
      <title>ASA 5510 support  ipsec site to site vpn by domain name way ?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-support-ipsec-site-to-site-vpn-by-domain-name-way/m-p/2345666#M345425</link>
      <description>&lt;P&gt;dear&amp;nbsp; helper,&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; my issue :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; our side&amp;nbsp; device is&amp;nbsp; Cisco asa 5510 SEC-BUN-K9 with a static ip , and the other side device is cisco RV180 &lt;/P&gt;&lt;P&gt;vpn router without&amp;nbsp; static IP (dial-up),&lt;/P&gt;&lt;P&gt;now&amp;nbsp; we plan to establish&amp;nbsp; IPSEC site to site vpn&amp;nbsp; between two sites.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have confirmed that RV180 support establishing&amp;nbsp; IPSEC site to site vpn with&amp;nbsp; domain name method&amp;nbsp; , However, &lt;/P&gt;&lt;P&gt;I'm not sure whether ASA 5510 also has this feature (means establish IPSEC site to site vpn with&amp;nbsp; domain name &lt;/P&gt;&lt;P&gt;method).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I would be very appreciated to all for the experience sharing&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:19:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-support-ipsec-site-to-site-vpn-by-domain-name-way/m-p/2345666#M345425</guid>
      <dc:creator>wangyilunwww</dc:creator>
      <dc:date>2019-03-12T02:19:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 support  ipsec site to site vpn by domain name way ?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-support-ipsec-site-to-site-vpn-by-domain-name-way/m-p/2345667#M345426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA can support this.&amp;nbsp; You just need configure a dynamic crypto map on the ASA.&amp;nbsp; Just remember that the dynamic crypto map should have the highest sequence number within the crypto map.&amp;nbsp; This is to be sure that the more specific maps are matched first.&amp;nbsp; (I have left out the NAT Exempt statement in the config below)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt;pre-shared-key &lt;PRE-SHARED key=""&gt;&lt;/PRE-SHARED&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CRYPTO-MAP permit ip 172.16.1.0 255.255.255.0 10.1.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set MY-SET esp-aes esp-sha-hmac&lt;BR /&gt;crypto dynamic-map MY-DYNAMIC-MAP 10 set transform-set MY-SET&lt;BR /&gt;&lt;SPAN style="line-height: 1.1em;"&gt;crypto map outside 100 ipsec-isakmp dynamic MY-DYNAMIC-MAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.1em;"&gt; &lt;/SPAN&gt;crypto map outside 100 match address CRYPTO-MAP&lt;BR /&gt;crypto map outside interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key &lt;PRE-SHARED key=""&gt;&lt;/PRE-SHARED&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Aug 2013 07:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-support-ipsec-site-to-site-vpn-by-domain-name-way/m-p/2345667#M345426</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-05T07:33:15Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 support  ipsec site to site vpn by domain name way ?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-support-ipsec-site-to-site-vpn-by-domain-name-way/m-p/2345668#M345429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp; hi Marius, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; thank you very much for your help ,i will&amp;nbsp; act&amp;nbsp; to do it .&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; best regards&lt;/P&gt;&lt;P&gt;&amp;nbsp; wang yi lun &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Aug 2013 08:19:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-support-ipsec-site-to-site-vpn-by-domain-name-way/m-p/2345668#M345429</guid>
      <dc:creator>wangyilunwww</dc:creator>
      <dc:date>2013-08-10T08:19:31Z</dc:date>
    </item>
  </channel>
</rss>

