<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Temporary Disable IP Sec VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974821#M440874</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks - I should have mentioned that there are other IPSEC vpn’s that need to stay up. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Jun 2012 17:24:47 GMT</pubDate>
    <dc:creator>craig.corbett</dc:creator>
    <dc:date>2012-06-14T17:24:47Z</dc:date>
    <item>
      <title>Temporary Disable IP Sec VPN</title>
      <link>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974818#M440871</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a site to site IPsec vpn as well as a LES circuit to the same destination. Some traffic will use the VPN and other the LES connection.&lt;/P&gt;&lt;P&gt;I need to temporarily kill the site to site VPN to do some testing and am looking at suggestions for the best way to do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was thinking of changing the IKE peer then clear crypto ipsec sa peer. I'll then put the correct ipsec peer in to pring up the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions / comments appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974818#M440871</guid>
      <dc:creator>craig.corbett</dc:creator>
      <dc:date>2019-03-11T23:19:00Z</dc:date>
    </item>
    <item>
      <title>Temporary Disable IP Sec VPN</title>
      <link>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974819#M440872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also you can do by removing the tunnel-group commands or removing the transform-set commands to achieve it... Pls try and let me know your results....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 16:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974819#M440872</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-06-14T16:49:39Z</dc:date>
    </item>
    <item>
      <title>Temporary Disable IP Sec VPN</title>
      <link>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974820#M440873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; also you can disable the interafce pointed for vpn traffic in vpn configurations. i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto map&lt;/STRONG&gt; &lt;EM&gt;map-name &lt;/EM&gt;&lt;STRONG&gt;interface&lt;/STRONG&gt; &lt;EM&gt;interface-name&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 16:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974820#M440873</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-06-14T16:53:45Z</dc:date>
    </item>
    <item>
      <title>Temporary Disable IP Sec VPN</title>
      <link>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974821#M440874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks - I should have mentioned that there are other IPSEC vpn’s that need to stay up. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 17:24:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974821#M440874</guid>
      <dc:creator>craig.corbett</dc:creator>
      <dc:date>2012-06-14T17:24:47Z</dc:date>
    </item>
    <item>
      <title>Temporary Disable IP Sec VPN</title>
      <link>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974822#M440877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Okay... Then you can use the 1st option by removing the tunnel group commands..... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 18:03:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974822#M440877</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-06-14T18:03:12Z</dc:date>
    </item>
    <item>
      <title>Temporary Disable IP Sec VPN</title>
      <link>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974823#M440879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I like the&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no crypto map &lt;/STRONG&gt;&lt;EM style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;map-name &lt;/EM&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;interface &lt;/STRONG&gt;&lt;EM style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;interface-name&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...option best. The map-name should be unique per IPsec L2L VPN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 19:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974823#M440879</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-06-14T19:04:53Z</dc:date>
    </item>
    <item>
      <title>I know this is an old post</title>
      <link>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974824#M440880</link>
      <description>&lt;P&gt;I know this is an old post but I would like to point out that this doesn't work - you can only have one crypto map on an interface, removing it will remove any other IPsec VPNs from that interface too.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 15:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-disable-ip-sec-vpn/m-p/1974824#M440880</guid>
      <dc:creator>RouteOps_gm</dc:creator>
      <dc:date>2017-08-01T15:46:00Z</dc:date>
    </item>
  </channel>
</rss>

