<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic L2L VPN cisco asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815618#M488956</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What troubleshooting have you performed? What debugs have you captured?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Jan 2012 11:46:08 GMT</pubDate>
    <dc:creator>andrew.prince</dc:creator>
    <dc:date>2012-01-10T11:46:08Z</dc:date>
    <item>
      <title>L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815613#M488945</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having an issue with establishing L2L VPN with remote site. My side is cisco asa 5520 and other side is check point UTM-- tunnel is not up.&lt;/P&gt;&lt;P&gt;just wnated to confirm on my sidde if the configuration is OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;al the parameters using are correct for both side.&amp;nbsp; any issue with below conf ? default route is pointing to my next GW address is there additiona default is required for VPN ? to reach the remote LAN somthing like pointing to remote peer address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to give a brief idea front end device is router as GW wher in internet is terminated and other wan connections ASA is behind ther GW rtr and outside int of asa and lan interface of GW rtr is having public ip. LAN&amp;nbsp; switch is connected to ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list insideinterface_nat0_outbound extended permit ip 192.168.36.0 255.255.255.0 10.34.12.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outsideinterface_cryptomap_40 extended permit ip 192.168.36.0 255.255.255.0 10.34.12.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (insideinterface) 0 access-list insideinterface_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto map outsideinterface_map_1 20 match address outsideinterface_cryptomap_20_1&lt;/P&gt;&lt;P&gt;crypto map outsideinterface_map_1 20 set peer 61.95.xxx.xxx &lt;/P&gt;&lt;P&gt;crypto map outsideinterface_map_1 20 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outsideinterface_map_1 40 match address outsideinterface_cryptomap_40&lt;/P&gt;&lt;P&gt;crypto map outsideinterface_map_1 40 set peer 61.95.xxx.xxx&lt;/P&gt;&lt;P&gt;crypto map outsideinterface_map_1 40 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outsideinterface_map_1 interface outsideinterface&lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp enable outsideinterface&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group 61.95.xxx.xxx type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 61.95.xxx.xxx ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group-map default-group 61.95.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:12:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815613#M488945</guid>
      <dc:creator>shijuuu</dc:creator>
      <dc:date>2019-03-11T22:12:14Z</dc:date>
    </item>
    <item>
      <title>L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815614#M488948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Comments:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) You have 2 crypto maps - the only thing they reference is a differenet transform-set, which the only diff between the transform-sets is the hash.&amp;nbsp; You can configure more than 1 encryption and or hash in a transform set, I suggest you do that and remove crypto map 40.&lt;/P&gt;&lt;P&gt;2) You have not posted you NAT config and more importantly the no-nat &lt;/P&gt;&lt;P&gt;3) You have not shown the "interesting traffic" acl so we cannot confirm that it's correct against your no-nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 09:27:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815614#M488948</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-10T09:27:30Z</dc:date>
    </item>
    <item>
      <title>L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815615#M488950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;thanks for reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;both are mentioned above as given below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list insideinterface_nat0_outbound extended permit ip 192.168.36.0 255.255.255.0 10.34.12.0 255.255.254.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list outsideinterface_cryptomap_40 extended permit ip 192.168.36.0 255.255.255.0 10.34.12.0 255.255.254.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;nat (insideinterface) 0 access-list insideinterface_nat0_outbound&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 11:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815615#M488950</guid>
      <dc:creator>shijuuu</dc:creator>
      <dc:date>2012-01-10T11:06:24Z</dc:date>
    </item>
    <item>
      <title>L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815616#M488952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That looks fine&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 11:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815616#M488952</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-10T11:26:05Z</dc:date>
    </item>
    <item>
      <title>L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815617#M488954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, Tunnel is still down not even phase one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh crypto isakmp sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;There are no isakmp sas&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is it because of any issue with remote site they are using check point UTM is multivendor product causing any issue ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any thoughts ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 11:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815617#M488954</guid>
      <dc:creator>shijuuu</dc:creator>
      <dc:date>2012-01-10T11:32:54Z</dc:date>
    </item>
    <item>
      <title>L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815618#M488956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What troubleshooting have you performed? What debugs have you captured?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 11:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815618#M488956</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-10T11:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815619#M488958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please see below out put debug crypto isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 10 04:00:51 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, QM FSM error (P2 struct &amp;amp;0x3805ac8, mess id 0xf0dcf0a4)!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:51 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:53 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, QM FSM error (P2 struct &amp;amp;0x3805ac8, mess id 0x7f48a5ec)!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:53 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:55 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, QM FSM error (P2 struct &amp;amp;0x4c942d0, mess id 0x869e9e2f)!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:55 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:57 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, QM FSM error (P2 struct &amp;amp;0x4921848, mess id 0x8cc099c6)!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:57 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:59 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, QM FSM error (P2 struct &amp;amp;0x4823700, mess id 0xae5b6bf3)!&lt;/P&gt;&lt;P&gt;Jan 10 04:00:59 [IKEv1]: Group = 61.95.143.140, IP = 61.95.143.140, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 11:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815619#M488958</guid>
      <dc:creator>shijuuu</dc:creator>
      <dc:date>2012-01-10T11:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815620#M488961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK make sure that:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) You remove crypto map 40&lt;/P&gt;&lt;P&gt;2) that "&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;crypto map outsideinterface_map_1 20 set peer &lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;61.95.xxx.xxx" actually is&amp;nbsp; &lt;/SPAN&gt;61.95.143.140&lt;/P&gt;&lt;P&gt;3) That "&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;tunnel-group 61.95.xxx.xxx type ipsec-l2l&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;tunnel-group 61.95.xxx.xxx ipsec-attributes&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;pre-shared-key *&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;tunnel-group-map default-group 61.95.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;actually are "61.95.143.140"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;Anf confirm your PSK is the same @ both ends.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 12:02:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815620#M488961</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-10T12:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815621#M488963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks all is well now...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 03:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815621#M488963</guid>
      <dc:creator>shijuuu</dc:creator>
      <dc:date>2012-01-11T03:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815622#M488965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;good&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 07:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-cisco-asa/m-p/1815622#M488965</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-11T07:57:45Z</dc:date>
    </item>
  </channel>
</rss>

