Cisco Support Community
Community Member

cisco asa5510 and dynamic vpn remote rv042

access-list sales-vpn standard permit
access-list no-nat extended permit ip
nat (inside) 0 access-list no-nat
global (outside) 1 interface
nat (inside) 1 0 0
access-list vpn extended permit ip
crypto ipsec transform-set site-to-site esp-des esp-md5-hmac
crypto dynamic-map site-vpn 30 match address vpn
crypto dynamic-map site-vpn 30 set transform-set site-to-site
crypto dynamic-map site-vpn 30 set security-association lifetime seconds 28800
crypto map sitevpn 30 ipsec-isakmp dynamic site-vpn
crypto map sitevpn interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 20
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 28800
group-policy tech internal
group-policy tech attributes
vpn-tunnel-protocol IPSec
password-storage enable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value sales-vpn
username tech password cisco123456
username tech attributes
vpn-group-policy tech
password-storage enable
tunnel-group DefaultL2LGroup ipsec-attributes
pre-shared-key cisco123456
tunnel-group type ipsec-l2l

group-policy DefaultL2LGroup internal
group-policy DefaultL2LGroup attributes
vpn-idle-timeout none
vpn-tunnel-protocol ikev1 l2tp-ipsec
password-storage enable
nem enable
tunnel-group DefaultL2LGroup general-attributes
default-group-policy DefaultL2LGroup
tunnel-group DefaultL2LGroup ipsec-attributes
ikev1 pre-shared-key qnct1973
ikev1 user-authentication none
tunnel-group-map default-group DefaultL2LGroup

Everyone's tags (5)
CreatePlease to create content