<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic c2s on asa using crypto map in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931845#M437566</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is it that you are trying to understand or what is that you dont understand about it? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the Group name is going to be extracted from the Tunnel group name you see configured. Then the attributes will be configured on the group-policy (on the router would be like the client configuration group) and on the IPsec attributes on the tunnel group is where you specify the pre-shared key. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The rest is pretty much the same, dynamic crypto maps, the crypto applied on the interface (on global configuration mode not in the interface per-se) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 May 2012 20:14:15 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2012-05-08T20:14:15Z</dc:date>
    <item>
      <title>c2s on asa using crypto map</title>
      <link>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931842#M437559</link>
      <description>&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;hello guys ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;i have started managing a asa 5510 firewall which is already having c2s tunnels , the problem i am facing is they are configured as "crypto map"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;i have attached sample config . , i am finding it difficult to understand the parameters used in each tunnel as the configration seems bit complex to me ,&amp;nbsp; if possible can anyone advice how it works .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;regards&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;amit&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931842#M437559</guid>
      <dc:creator>amit bhatnagar</dc:creator>
      <dc:date>2019-03-11T23:03:03Z</dc:date>
    </item>
    <item>
      <title>c2s on asa using crypto map</title>
      <link>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931843#M437562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Amit&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be glad to help if you let me know what you mean by c2s. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 00:16:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931843#M437562</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-08T00:16:05Z</dc:date>
    </item>
    <item>
      <title>c2s on asa using crypto map</title>
      <link>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931844#M437564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; client to site or remorte access vpn , would appreciate help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 19:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931844#M437564</guid>
      <dc:creator>amit bhatnagar</dc:creator>
      <dc:date>2012-05-08T19:59:42Z</dc:date>
    </item>
    <item>
      <title>c2s on asa using crypto map</title>
      <link>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931845#M437566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is it that you are trying to understand or what is that you dont understand about it? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the Group name is going to be extracted from the Tunnel group name you see configured. Then the attributes will be configured on the group-policy (on the router would be like the client configuration group) and on the IPsec attributes on the tunnel group is where you specify the pre-shared key. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The rest is pretty much the same, dynamic crypto maps, the crypto applied on the interface (on global configuration mode not in the interface per-se) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 20:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/c2s-on-asa-using-crypto-map/m-p/1931845#M437566</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-08T20:14:15Z</dc:date>
    </item>
  </channel>
</rss>

