?
Solved

Cisco DefaultL2L VPN needs to map to different policies based on site

Posted on 2012-08-26
8
Medium Priority
?
709 Views
Last Modified: 2012-09-12
I have multiple sites connecting via our DefaultL2L VPN.  I need to create other DefaultL2L's that will map to different tunnel groups based on the remote site's needs.  How can this be accomplished?  I have attached our ASA config and the general router config that is using the DefaultL2L now.  TIA!
ASA-8-26-12.log
HBF.txt
0
Comment
Question by:Humongous
  • 5
  • 3
8 Comments
 
LVL 2

Assisted Solution

by:Sepist
Sepist earned 750 total points
ID: 38337408
Under `tunnel-group X.X.X.X general-attributes` you can apply the default-group-policy command and point it to another group policy you create based on your needs.
0
 

Author Comment

by:Humongous
ID: 38338548
Thanks for the response...  will this affect all other DefaultL2L VPN connections?
0
 
LVL 2

Expert Comment

by:Sepist
ID: 38338561
Nope, just give this new group policy a new name so that you don't overwrite the DefaultL2L group.
0
 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

 

Author Comment

by:Humongous
ID: 38348273
Will try tonight and let you know tomorrow - thanks!
0
 

Author Comment

by:Humongous
ID: 38352572
Nothing.  Don't I have to change things on the remote peer as well?
0
 
LVL 2

Expert Comment

by:Sepist
ID: 38352639
Nope. Can you post what changes you made?
0
 

Accepted Solution

by:
Humongous earned 0 total points
ID: 38377695
Expanded DefaultL2L subnets and using ACLs at remote routers.  Will give partial points as I am guessing that your solution will work.  Thanks
0
 

Author Closing Comment

by:Humongous
ID: 38390187
It is what worked for my situation.
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

807 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question