Cisco 5510 Getting Started Guide - Page 155

Information to Have Available, Configuring the Site-to-Site VPN

Page 155 highlights

Chapter 12 Scenario: Site-to-Site VPN Configuration Implementing the Site-to-Site Scenario Information to Have Available Before you begin the configuration procedure, obtain the following information: • IP address of the remote adaptive security appliance peer • IP addresses of local hosts and networks permitted to use the tunnel to communicate with resources at the remote site • IP addresses of remote hosts and networks permitted to use the tunnel to communicate with local resources Configuring the Site-to-Site VPN This section describes how to use the ASDM VPN Wizard to configure the adaptive security appliance for a site-to-site VPN. This section includes the following topics: • Configuring the Security Appliance at the Local Site, page 12-3 • Providing Information About the Remote VPN Peer, page 12-5 • Configuring the IKE Policy, page 12-6 • Configuring IPsec Encryption and Authentication Parameters, page 12-8 • Specifying Hosts and Networks, page 12-9 • Viewing VPN Attributes and Completing the Wizard, page 12-10 The following sections provide detailed instructions for how to perform each configuration step. Configuring the Security Appliance at the Local Site Note The adaptive security appliance at the first site is referred to as Security Appliance 1 in this scenario. 78-19186-01 Cisco ASA 5500 Series Getting Started Guide 12-3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

12-3
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 12
Scenario: Site-to-Site VPN Configuration
Implementing the Site-to-Site Scenario
Information to Have Available
Before you begin the configuration procedure, obtain the following information:
IP address of the remote adaptive security appliance peer
IP addresses of local hosts and networks permitted to use the tunnel to
communicate with resources at the remote site
IP addresses of remote hosts and networks permitted to use the tunnel to
communicate with local resources
Configuring the Site-to-Site VPN
This section describes how to use the ASDM VPN Wizard to configure the
adaptive security appliance for a site-to-site VPN.
This section includes the following topics:
Configuring the Security Appliance at the Local Site, page 12-3
Providing Information About the Remote VPN Peer, page 12-5
Configuring the IKE Policy, page 12-6
Configuring IPsec Encryption and Authentication Parameters, page 12-8
Specifying Hosts and Networks, page 12-9
Viewing VPN Attributes and Completing the Wizard, page 12-10
The following sections provide detailed instructions for how to perform each
configuration step.
Configuring the Security Appliance at the Local Site
Note
The adaptive security appliance at the first site is referred to as Security
Appliance 1 in this scenario.