ASA IKEv2 L2L Policy-Based VPN


1. Create Phase I policy
crypto ikev2 policy 10
 encryption aes-256
 integrity sha256
 group 14
 prf sha256
 lifetime seconds 86400

2. Enable IKEv2 on outside interface
crypto ikev2 enable outside

3. Create objects for local and remote protected networks.
object network LOCAL-NET-192.168.1.0_24
 subnet 192.168.1.0 255.255.255.0
object network REMOTE-NET-192.168.2.0_24
 subnet 192.168.2.0 255.255.255.0

4. Create VPN-ACL
access-list VPN-ACL extended permit ip object LOCAL-NET-192.168.1.0_24 object REMOTE-NET-192.168.2.0_24

5. Create NAT exemption
nat (inside,outside) source static LOCAL-NET-192.168.1.0_24 LOCAL-NET-192.168.1.0_24 destination static REMOTE-NET-192.168.2.0_24 REMOTE-NET-192.168.2.0_24 no-proxy-arp route-lookup

5. Create Phase II proposal
crypto ipsec ikev2 ipsec-proposal AES256-SHA256
 protocol esp encryption aes-256
 protocol esp integrity sha-256

6. Create crypto map, pfs is optional, new version life time is 28800 sec, old version is 3600 sec
crypto map CM 10 match address VPN-ACL
crypto map CM 10 set pfs group14
crypto map CM 10 set peer 203.0.113.1
crypto map CM 10 set ikev2 ipsec-proposal AES256-SHA256

7. Attach the crypto map to outside interface
 crypto map CM interface outside

8. Create tunnel-group
tunnel-group 203.0.113.2 type ipsec-l2l
tunnel-group 203.0.113.2 ipsec-attributes
 ikev2 remote-authentication pre-shared-key Cisco123
 ikev2 local-authentication pre-shared-key Cisco123



Comments

Popular posts from this blog

Firepower FMC and FTD troubleshooting

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.