6: Networking
EMG™ Edge Management Gateway User Guide
97
crypto ipsec security-association pmtu-aging infinite
crypto map site2site 10
match address asa-router-vpn
set pfs group5
set peer 192.168.1.204
set ikev1 transform-set ipsecvpn
crypto map site2site interface outside
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share encryption aes
hash sha
group 5
lifetime 86400
tunnel-group 192.168.1.204 type ipsec-l2l
tunnel-group 192.168.1.204 ipsec-attributes
ikev1 pre-shared-key *****
Cisco ASA5525x Pre-Shared Key / IKEv2
This configuration is an example of a remote access connection to a Cisco ASA5525 VPN server /
responder. The aggressive setting can be either
yes
or
no
; the Cisco ASA will honor the peer
configuration.
Console manager configuration
The pre-shared key needs to be configured via the console manager UI.
conn ASA5525
keyexchange=ikev2
ike=3des-sha2_256-modp1536!
esp=3des-sha2_256-modp1536!
aggressive=no
lifetime=86400s
forceencaps=no
authby=secret
left=%any
leftsubnet=192.168.0.0/24
modeconfig=pull
right=192.168.1.130
rightsubnet=192.168.3.0/24
dpddelay=0
dpdtimeout=5
dpdaction=restart
auto=start
type=tunnel