Specifications

Chapter 7 Scenario: Site-to-Site VPN Configuration
Implementing the Site-to-Site Scenario
7-10
Cisco ASA 5580 Getting Started Guide
78-18101-01
Step 1 Choose the encryption algorithm (DES/3DES/AES) from the Encryption
drop-down list, and the authentication algorithm (MD5/SHA) from the
Authentication drop-down list.
Step 2 Click Next to continue.
Specifying Hosts and Networks
Identify hosts and networks at the local site that are permitted to use this IPsec
tunnel to communicate with hosts and networks on the other side of the tunnel.
Specify hosts and networks that are permitted access to the tunnel by clicking
Add or Delete. In the current scenario, traffic from Network
A (10.10.10.0) is
encrypted by Security Appliance
1 and transmitted through the VPN tunnel.