cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
659
Views
13
Helpful
3
Replies

Help with dynamic to static L2L

WStoffel1
Level 1
Level 1

I'm having some issues with a L2L tunnel where the remote end has a DHCP address on the outside interface, it's a

WRVS4400N Wireless-N Gigabit Security Router with VPN, and I'm locked into a particular configuration on that end.  My end is a ASA5540, which needs to accept a dynamic connection, and I can do whatever I need to to get this up and running....

Remote end in Rome

192.168.252.0/24 inside network and needs to be able to talk to my end 192.168.240.0/24; 192.168.241.0/24; and 192.168.242.0/24

IPSec setup in Rome that cannot be changed:

IKE with preshared key

Phase1 3DES, MD5, DH 2, key lifetime 86400

Phase2 3DES, MD5, PFS Enable, DH 2, key lifetime 28800, preshared key XXXXX

On my end I have the ACL's and NAT exemption correct....I can actually treat the current remote outside IP as a static and bring the tunnel up no problem.  My issue is getting the dynamic crypto correct.

Here's what I have currently (or should I say have previously configured) on the ASA as far as dynamic crypto:

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto dynamic-map cisco 1 set transform-set ESP-3DES-MD5

crypto dynamic-map cisco 1 set security-association lifetime seconds 28800

crypto dynamic-map cisco 1 set security-association lifetime kilobytes 4608000

crypto isakmp identity address

crypto isakmp enable outside

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

lifetime 86400

So my isakmp policy 5 matches my needed phase1.  My ESP-3DES-MD5 transform matches my needed phase 2 encryption/authentication....

I believe all I'm missing is a way to match PFS and DH 2 for phase2?

And since my ACL is named Rome, then my tunnel-group should be named Rome as well?

Thank you.

1 Accepted Solution

Accepted Solutions

I don't think we can have multiple dynamic IP peers use diff pre-shared in such setup.

-

Sourav

View solution in original post

3 Replies 3

Thanks, that helped me get the tunnels up.  But it leads to a few questions.  There were already a couple of previously configured dynamic tunnels which were hitting the tunnel-group DefaultL2LGroup, and these new ones are as well.

So now I have multiple tunnels using the same pre shared key.  That doesn't strike me as secure.  How do I get a dynamic tunnel to hit its own tunnel group? 

And am I limited to a single Crypto dynamic-map entry or can i have multiple?

Thanks again.

I don't think we can have multiple dynamic IP peers use diff pre-shared in such setup.

-

Sourav