briancox86
IS-IT--Management
I am trying to bring up a VPN between 2 sites. One has a Cisco 7200 the other has an ASA 5505. The VPN will not come up.
It does not show up in 'sho crypto isakmp sa' output.
No stats but there is an entry for it in 'sho crypto ipsec sa' output.
Any help greatly appreciated!!!
Can someone please help.
Thanks!
===Config on 7200===
crypto isakmp key * address [REMOTE SITE WAN IP]
crypto ipsec transform-set defaultset esp-3des esp-md5-hmac
crypto map office-vpn 1420 ipsec-isakmp
set peer [REMOTE SITE WAN IP]
set transform-set defaultset
match address office-to-remote
ip route 10.149.37.96 255.255.255.224 [REMOTE SITE WAN IP]
ip access-list extended office-to-remote
permit ip any host [REMOTE SITE WAN IP]
permit ip any 10.149.37.96 0.0.0.31
===Config on 5505===
ASA Version 7.2(4)
access-list to-home extended permit ip 10.149.37.96 255.255.255.224 any
global (outside) 1 interface
route outside 0.0.0.0 0.0.0.0 [GATEWAY] 1
crypto ipsec transform-set SET esp-3des esp-md5-hmac
crypto map ABC 10 match address to-home
crypto map ABC 10 set peer [VPN PEER]
crypto map ABC 10 set transform-set SET
crypto map ABC interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
management-access inside
tunnel-group [VPN PEER] type ipsec-l2l
tunnel-group [VPN PEER] ipsec-attributes
pre-shared-key *
class-map inspection_default
match default-inspection-traffic
service-policy global_policy global
It does not show up in 'sho crypto isakmp sa' output.
No stats but there is an entry for it in 'sho crypto ipsec sa' output.
Any help greatly appreciated!!!
Can someone please help.
Thanks!
===Config on 7200===
crypto isakmp key * address [REMOTE SITE WAN IP]
crypto ipsec transform-set defaultset esp-3des esp-md5-hmac
crypto map office-vpn 1420 ipsec-isakmp
set peer [REMOTE SITE WAN IP]
set transform-set defaultset
match address office-to-remote
ip route 10.149.37.96 255.255.255.224 [REMOTE SITE WAN IP]
ip access-list extended office-to-remote
permit ip any host [REMOTE SITE WAN IP]
permit ip any 10.149.37.96 0.0.0.31
===Config on 5505===
ASA Version 7.2(4)
access-list to-home extended permit ip 10.149.37.96 255.255.255.224 any
global (outside) 1 interface
route outside 0.0.0.0 0.0.0.0 [GATEWAY] 1
crypto ipsec transform-set SET esp-3des esp-md5-hmac
crypto map ABC 10 match address to-home
crypto map ABC 10 set peer [VPN PEER]
crypto map ABC 10 set transform-set SET
crypto map ABC interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
management-access inside
tunnel-group [VPN PEER] type ipsec-l2l
tunnel-group [VPN PEER] ipsec-attributes
pre-shared-key *
class-map inspection_default
match default-inspection-traffic
service-policy global_policy global