![Cisco 5505 asa graphical interface](https://knopkazmeya.com/16.png)
![cisco 5505 asa graphical interface cisco 5505 asa graphical interface](https://www.secureitstore.com/images/Firepower/Firepower-1000/firepower-1010-spec.png)
A crypto map defines an IPSec policy that includes an ACL to identify the interesting traffic, peer IP and IKEv1 transform-set that we created in the previous step. Configure a Crypto Map and apply it to the outside interface. crypto ipsec ikev1 transform-set AES-HMAC esp-aes-256 esp-sha-hmacĥ. Configure the Transform Set which is a combination of security protocols and algorithms that define the way the VPN peers protect data. Please note that the PSKs should match on both sides. Create a tunnel-group and configure the peer IP address alongside the tunnel pre-shared key (PSK). You can check whether there are any policies by running show run crypto ikev1 command. If you already have a policy then you don't need to create them. Please note that these policies should match on both sides. Create an IKEv1 policy that defines the algorithms/methods to be used for hashing, authentication, DH group, lifetime, and encryption.
![cisco 5505 asa graphical interface cisco 5505 asa graphical interface](http://mars.tekkom.dk/w/images/a/a4/CiscoASA5505-DMZtegning.png)
![cisco 5505 asa graphical interface cisco 5505 asa graphical interface](https://www.comkala.net/wp-content/uploads/2019/05/cisco-asa-5505-firewall-v12-8-port-adaptive-security-appliance-50-hosts-1.jpg)
Cisco ASA non-VPN Configurations Branch Office Branch Office ASA Let's assume the client-pc (10.10.60.10) in the branch office needs to access a web server (192.168.10.10) in the headquarters.
![cisco 5505 asa graphical interface cisco 5505 asa graphical interface](https://www.maximummidrange.com/blog/wp-content/uploads/2013/06/CiscoASA5505-5510.jpg)
Our ultimate goal here is to set up a site-to-site VPN between the Branch Office and the Headquarters.
![Cisco 5505 asa graphical interface](https://knopkazmeya.com/16.png)