7: Networking
EMG™ Edge Management Gateway User Guide
128
Cisco ASA5525x Pre-Shared Key / IKEv1
This configuration is an example of a remote access connection to a Cisco ASA5525 VPN server /
responder.
EMG configuration
The pre-shared key needs to be configured via the console manager UI.
conn ASA5525
keyexchange=ikev1
ike=aes-sha1-modp1536!
esp=aes-sha1-modp1536!
aggressive=yes
lifetime=86400s
forceencaps=no
authby=secret
left=%any
leftsubnet=192.168.0.0/24
modeconfig=pull
right=192.168.1.130
rightsubnet=192.168.3.0/24
dpddelay=10
dpdtimeout=5
dpdaction=restart
auto=start
type=tunnel
Cisco configuration
Note:
Main or aggressive mode is determined by the EMG side of the tunnel, and does
not require any change in the Cisco configuration:
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 192.168.1.130 255.255.255.0
interface GigabitEthernet0/3
nameif inside security-level 100
ip address 192.168.3.130 255.255.255.0
object-group network local-network
network-object 192.168.3.0 255.255.255.0
object-group network remote-network
network-object 192.168.0.0 255.255.255.0
access-list asa-router-vpn extended permit ip object-group local-network
object-group remote-network
route outside 192.168.0.0 255.255.255.0 192.168.1.204 1
route inside 192.168.3.250 255.255.255.255 192.168.3.250 1
crypto ipsec ikev1 transform-set ipsecvpn esp-aes esp-sha-hmac
Summary of Contents for EMG Series
Page 100: ...7 Networking EMG Edge Management Gateway User Guide 100 Figure 7 5 Network Wireless Settings...
Page 353: ...15 Maintenance EMG Edge Management Gateway User Guide 353 Figure 15 12 About EMG...
Page 474: ...EMG Edge Management Gateway User Guide 474 Figure E 3 EU Declaration of Conformity...
Page 475: ...EMG Edge Management Gateway User Guide 475 Figure E 4 EU Declaration of Conformity continued...