ciscoasa# ping R10.20.30.1 ciscoasa# ping RKA ciscoasa# ping RKACC_NETWORK 10.20.30.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.20.30.1, timeout is 2 seconds: ????? Success rate is 0 percent (0/5) ciscoasa# sh crypto ipsec sa interface: External_Connection Crypto map tag: outside_map, seq num: 20, local addr: 212.59.7.35 access-list 100 permit ip 10.89.48.0 255.255.255.0 RUSSIA_BACKUP 255.255.255.0 local ident (addr/mask/prot/port): (10.89.48.0/255.255.255.0/0/0) remote ident (addr/mask/prot/port): (RUSSIA_BACKUP/255.255.255.0/0/0) current_peer: russia_ip #pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4 #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 4, #pkts comp failed: 0, #pkts decomp failed: 0 #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0 #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0 #send errors: 0, #recv errors: 0 local crypto endpt.: 212.59.7.35, remote crypto endpt.: russia_ip path mtu 1500, ipsec overhead 58, media mtu 1500 current outbound spi: 19AC5164 inbound esp sas: spi: 0x44827558 (1149400408) transform: esp-3des esp-sha-hmac no compression in use settings ={L2L, Tunnel, } slot: 0, conn_id: 442368, crypto-map: outside_map sa timing: remaining key lifetime (kB/sec): (4374000/28778) IV size: 8 bytes replay detection support: Y Anti replay bitmap: 0x00000000 0x00000001 outbound esp sas: spi: 0x19AC5164 (430723428) transform: esp-3des esp-sha-hmac no compression in use settings ={L2L, Tunnel, } slot: 0, conn_id: 442368, crypto-map: outside_map sa timing: remaining key lifetime (kB/sec): (4373999/28778) IV size: 8 bytes replay detection support: Y Anti replay bitmap: 0x00000000 0x00000001 ciscoasa#