The standard configuration files for all VPN devices represent the minimum accepted values, meaning IKEv1. This article provides the IKEv2 configuration steps for Anypoint VPN with Cisco ASA devices, using static routing. For IKEv2 with dynamic routing, refer to: Anypoint VPN IKEv2 Configuration for Cisco ASA devices using BGP routing
Note: IKEv2 is supported with route-based VPNs only. This means you must be running ASA version 9.7.1 or later, which adds support for the required Virtual Tunnel Interface (VTI).
Important: This Knowledge Article aims to provide basic guidelines for configuring Anypoint VPN with Cisco ASA devices. The contents of the article are to be used at your own risk and are provided as-is. For further information on configuring Cisco ASA devices, please reach out to Cisco support.
crypto ikev2 enable OUTSIDE crypto ikev2 policy 200 encryption aes integrity sha group 2 prf sha lifetime seconds 28000
crypto ipsec ikev2 ipsec-proposal MULESOFT protocol esp encryption aes-128 protocol esp integrity sha crypto ipsec profile MULESOFT set ikev2 ipsec-proposal MULESOFT set pfs group 2 set security-association lifetime seconds 3000The Tunnel Group defines the Pre Shared Key for tunnel endpoint authentication.
tunnel-group 198.51.100.1 type ipsec-l2l tunnel-group 198.51.100.1 ipsec-attributes isakmp keepalive threshold 10 retry 10 ikev2 remote-authentication pre-shared-key <PSK> ikev2 local-authentication pre-shared-key <PSK>
tunnel-group 203.0.113.2 type ipsec-l2l tunnel-group 203.0.113.2 ipsec-attributes isakmp keepalive threshold 10 retry 10 ikev2 remote-authentication pre-shared-key <PSK> ikev2 local-authentication pre-shared-key <PSK>Additional IPsec parameters are set here. These are global parameters that may impact other IPsec associations
crypto ipsec df-bit clear-df OUTSIDE
crypto ipsec security-association replay window-size 128
interface Tunnel1 name-if TUNNEL-1 ip address 169.254.11.2 255.255.255.252 tunnel source interface OUTSIDE tunnel destination 198.51.100.1 tunnel mode ipsec ipv4 tunnel protection ipsec profile MULESOFT
interface Tunnel2 name-if TUNNEL-2 ip address 169.254.12.2 255.255.255.252 tunnel source interface OUTSIDE tunnel destination 203.0.113.2 tunnel mode ipsec ipv4 tunnel protection ipsec profile MULESOFT
route TUNNEL-1 10.10.0.0 255.255.0.0 169.254.11.1 100
route TUNNEL-2 10.10.0.0 255.255.0.0 169.254.12.1 200
001117056

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.