<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SITE -To-SITE VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859843#M489278</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all replies,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the vpn configuration for ASA 8.4. Is there any configuration example for 8.4. If not possible than can u highlight the major changes that i have to take care for the configuration in 8.4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 14 Jan 2012 14:34:12 GMT</pubDate>
    <dc:creator>jack samuel</dc:creator>
    <dc:date>2012-01-14T14:34:12Z</dc:date>
    <item>
      <title>SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859833#M489256</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to create a site to site vpn on ASA both side, but the tunnel is not initiating, here are the configs and the packet tracer.If you notice the packet tracer the traffic is drop due to acl, but i m permitting the traffic on outside interface still the tunnell is not up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; lan-A-----ASA1------router-------ASA2------- lan-B.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic initiating from LAN-A to LAN-B.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1(config)# packet-tracer input inside tcp 1.1.1.0 23 3.3.3.0 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 1.1.1.0 255.255.255.0 outside 3.3.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.20.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.20.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: encrypt&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1(config)# sh running-config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA1&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list vpn extended permit ip 1.1.1.0 255.255.255.0 3.3.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 1.1.1.0 255.255.255.0 3.3.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip 3.3.3.0 255.255.255.0 1.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered notifications&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.20.2 1&lt;/P&gt;&lt;P&gt;route inside 1.1.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map ipsec 10 match address vpn&lt;/P&gt;&lt;P&gt;crypto map ipsec 10 set peer 192.168.30.1&lt;/P&gt;&lt;P&gt;crypto map ipsec 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map ipsec interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tunnel-group asa2 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group asa2 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:00000000000000000000000000000000&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA1(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA2(config)# sh running-config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA2&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.40.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 3.3.3.0 255.255.255.0 1.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn extended permit ip 3.3.3.0 255.255.255.0 1.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip 1.1.1.0 255.255.255.0 3.3.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered notifications&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.30.2 1&lt;/P&gt;&lt;P&gt;route inside 3.3.3.0 255.255.255.0 192.168.40.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map IPSec_map 10 match address vpn&lt;/P&gt;&lt;P&gt;crypto map IPSec_map 10 set peer 192.168.20.1&lt;/P&gt;&lt;P&gt;crypto map IPSec_map 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map IPSec_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tunnel-group asa1 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group asa1 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:00000000000000000000000000000000&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:10:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859833#M489256</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2019-03-11T22:10:52Z</dc:date>
    </item>
    <item>
      <title>SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859834#M489259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you change tunnel-group name to remote IP both sides ? and try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 192.168.20.1 type ipsec-l2l&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 04:46:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859834#M489259</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-06T04:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859835#M489261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the tunnel came up but i have one issue my telnet is working but icmp is not working. ???? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i enter sysopt connection permit-vpn command icmp works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hints&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 20:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859835#M489261</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-06T20:07:09Z</dc:date>
    </item>
    <item>
      <title>SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859836#M489264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The command " sysopt connection permit-vpn" tells the ASA to allow the VPN traffic regardless of access-lists.&lt;/P&gt;&lt;P&gt;&amp;nbsp; however please configure inspact commands are here and try .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;policy-map global_policy
&amp;nbsp;&amp;nbsp;&amp;nbsp; class inspection_default
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;BR /&gt; &lt;BR /&gt; Thanks&lt;BR /&gt; Ajay&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 20:18:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859836#M489264</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-06T20:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859837#M489266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ajay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without doing the above inspect and removing the sysopt connection permit-vpn command it is working, i dont know how ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The tunnel groups are the only name's why they have changed to IP's&lt;/LI&gt;&lt;LI&gt;If my remote end is not a fixed public IP and if i want to put a DDNS name of remote branch router which is on ADSL then it will work ??????&lt;/LI&gt;&lt;LI&gt;what will be the crypto map IPsec_map 10 set peer ?????? (I hope it will be DDNS name)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pls reply&lt;/P&gt;&lt;P&gt;Tx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 20:56:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859837#M489266</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-06T20:56:25Z</dc:date>
    </item>
    <item>
      <title>SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859838#M489267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; &lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; This might help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For queston 1- I have tried so many times it just work with IP in all cisco docs no where name is mentoned.Even best practice is to&amp;nbsp; use the IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question 2 and 3 the link given has remote as dynamic IP with full config on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;amp; its good to know ping started working sometimes diffrent tricks &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 23:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859838#M489267</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-06T23:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859839#M489269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I have a query regarding the link given above mail . Can a PIX can initiate a connection to the vpn tunnel????&lt;/LI&gt;&lt;LI&gt;I want to know what configuration i have to do on the ADSL router for the DDNS update, In other words Dynamic DNS update configuration on router&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jan 2012 20:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859839#M489269</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-13T20:13:51Z</dc:date>
    </item>
    <item>
      <title>SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859840#M489271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The router can initiate connections to the PIX, but the PIX cannot initiate connections to the router. See the link below-&lt;/P&gt;&lt;P&gt; &lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX can initiate connections to the router, but the router cannot initiate connections to the PIX. See the link below-&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807fbdc8.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807fbdc8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So whoever has got dynamic IP can initiate the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This external link might help to configure DDNS on ADSL. However I never tried.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://joe-ma-how-to.blogspot.com/2008/05/dynamic-dns-on-cisco-adsl-router.html"&gt;http://joe-ma-how-to.blogspot.com/2008/05/dynamic-dns-on-cisco-adsl-router.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Jan 2012 08:59:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859840#M489271</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-14T08:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859841#M489273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i wanna initiate a conenction from both the router and the ASA is it possible ??? when ASA is on static IP and the router on dynamic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Jan 2012 10:50:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859841#M489273</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-14T10:50:57Z</dc:date>
    </item>
    <item>
      <title>SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859842#M489275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer would be NO.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Jan 2012 12:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859842#M489275</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-14T12:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: SITE -To-SITE VPN</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859843#M489278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all replies,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the vpn configuration for ASA 8.4. Is there any configuration example for 8.4. If not possible than can u highlight the major changes that i have to take care for the configuration in 8.4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Jan 2012 14:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn/m-p/1859843#M489278</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-14T14:34:12Z</dc:date>
    </item>
  </channel>
</rss>

