cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1183
Views
0
Helpful
5
Replies

ASA VPN tunnel

Hello Experts,

 

Whether we can use the same policy and transform-set for multiple tunnels?

 

eg: I have created one policy and one transform-set in router(IKEv1).

I planned to add multiple crypto-map for different customer and separate interesting ACL in encryption domain.

 

Whether it will work?

 

Also what is mean by Cipher, I have come across while reading the encryption document.

 

Regards,

Sathish

2 Accepted Solutions

Accepted Solutions

bhargavdesai
Spotlight
Spotlight
You can use same ISAKM Policy and transform set (Phase-1 & 2) to secure multiple VPN tunnels. You do need to configure different ACL for interesting traffic, Peer IP configuration. Even you can use the same pre-shared key but you should use different for security reasons. You can only apply One crypto-map per interface so you need to create single crypto-map with multiple sequence number for different customers.
Below links might help you.

http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/867-cisco-router-site-to-site-ipsec-vpn.html



HTH
### RATE ALL HELPFUL RESPONSES ###

View solution in original post

Also, a cipher is the algorithm used for encrypting and decrypting.  In VPN you have two ciphers or encryptions, first one is for the tunnel managment (ISAKMP), the second encryption is for the data traffic (IPsec).

--
Please remember to select a correct answer and rate helpful posts

View solution in original post

5 Replies 5

Yes, you can do this.  Infact it is a good practice as this keeps configuration clutter to a minimum.

--
Please remember to select a correct answer and rate helpful posts

bhargavdesai
Spotlight
Spotlight
You can use same ISAKM Policy and transform set (Phase-1 & 2) to secure multiple VPN tunnels. You do need to configure different ACL for interesting traffic, Peer IP configuration. Even you can use the same pre-shared key but you should use different for security reasons. You can only apply One crypto-map per interface so you need to create single crypto-map with multiple sequence number for different customers.
Below links might help you.

http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/867-cisco-router-site-to-site-ipsec-vpn.html



HTH
### RATE ALL HELPFUL RESPONSES ###

Thanks for the information

Also, a cipher is the algorithm used for encrypting and decrypting.  In VPN you have two ciphers or encryptions, first one is for the tunnel managment (ISAKMP), the second encryption is for the data traffic (IPsec).

--
Please remember to select a correct answer and rate helpful posts
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card