Link to home
Start Free TrialLog in
Avatar of farroar
farroarFlag for United States of America

asked on

Dynamic to static L2L IPSec tunnel - ASA / IOS - Select different group

I have an IOS router with a dynamic IP that I need to have connect to a static ASA for a L2L IPSec tunnel. Config is okay but I need to have this tunnel not land on the DefaultL2LGroup policy. I have seen some mention of the need to use certificates for this to work but I'm having trouble finding a good walkthrough. I need to set up the dynamic side (Cisco IOS router) to somehow let the static side (Cisco ASA) know that this connection needs to be addressed by a different group other than the default.

Thanks!
ASKER CERTIFIED SOLUTION
Avatar of Henk van Achterberg
Henk van Achterberg
Flag of Netherlands image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of farroar

ASKER

Thanks for the Link! Seems to be exactly what I need but it doesn't seem to be working. Let me play with it for a bit and get back to you. One thing to note.. the ASA already has many VPNs dynamic and L2L terminating to it. I just need to make sure none of the adjustments I make are global. They can only address this one connection.
Avatar of farroar

ASKER

Good link. It got me going in the right direction. Thanks!