<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN L2L in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784817#M1005005</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yup tried that also...only reason I tried the same one for both was because it wasn't working.  Anyway I just switched it back to seperate ACls, still same problem:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list london-nat extended permit ip 192.168.71.0 255.255.255.0 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list london-nat extended permit ip 10.24.1.0 255.255.255.0 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list london-nat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 May 2007 12:57:22 GMT</pubDate>
    <dc:creator>niro</dc:creator>
    <dc:date>2007-05-09T12:57:22Z</dc:date>
    <item>
      <title>VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784813#M1005000</link>
      <description>&lt;P&gt;I'm having trouble setting up a pix to pix vpn connection...I'm running a pix 515 v 7.0 on one end and a pix 515e 6.3 on the other end, here's the vpn configs (I starred out the public IPs) The tunnel I'm working on is the vpntunnel 21 and europe:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;europe:&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip 192.168.71.0 255.255.255.0 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip 10.20.1.0 255.255.255.0 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set RTS esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set london esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map RTS 1 set peer *******&lt;/P&gt;&lt;P&gt;crypto map RTS 1 set transform-set RTS&lt;/P&gt;&lt;P&gt;crypto map vpntunnel 21 match address 101&lt;/P&gt;&lt;P&gt;crypto map vpntunnel 21 set peer ******&lt;/P&gt;&lt;P&gt;crypto map vpntunnel 21 set transform-set london&lt;/P&gt;&lt;P&gt;crypto map vpntunnel interface outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 10000&lt;/P&gt;&lt;P&gt;tunnel-group RTS type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group ****** type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group ****** ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group ****** type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group ****** ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;London:&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.70.0 255.255.255.0 192.168.55.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 172.16.70.0 255.255.255.0 172.17.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.70.0 255.255.255.0 192.168.71.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.70.0 255.255.255.0 10.20.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list hk permit ip 192.168.70.0 255.255.255.0 192.168.71.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list hk permit icmp 192.168.70.0 255.255.255.0 192.168.71.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list hk permit ip 192.168.70.0 255.255.255.0 10.20.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ny esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set europe esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map vpntunnel 1 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map vpntunnel 1 match address 102&lt;/P&gt;&lt;P&gt;crypto map vpntunnel 1 set peer ******&lt;/P&gt;&lt;P&gt;crypto map vpntunnel 1 set transform-set ny&lt;/P&gt;&lt;P&gt;crypto map europe 5 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map europe 5 match address hk&lt;/P&gt;&lt;P&gt;crypto map europe 5 set peer ******&lt;/P&gt;&lt;P&gt;crypto map europe 5 set transform-set london&lt;/P&gt;&lt;P&gt;crypto map europe interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address ****** netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 10000&lt;/P&gt;&lt;P&gt;isakmp policy 6 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 6 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 6 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 6 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 6 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnel seems to come up normal when I initiate it from the london side, but not from the europe side.  Also even though the tunnel is up, no traffic seems to be going through, I'm not able to connect to any devices on the other side:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Europe:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   Active SA: 1&lt;/P&gt;&lt;P&gt;    Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;/P&gt;&lt;P&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1   IKE Peer: *******&lt;/P&gt;&lt;P&gt;    Type    : L2L             Role    : responder&lt;/P&gt;&lt;P&gt;    Rekey   : no              State   : MM_ACTIVE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;London:&lt;/P&gt;&lt;P&gt;Total     : 1&lt;/P&gt;&lt;P&gt;Embryonic : 0&lt;/P&gt;&lt;P&gt;        dst               src        state     pending     created&lt;/P&gt;&lt;P&gt;    ******    172.16.70.100    QM_IDLE         0           1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas what I'm doing wrong here??&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784813#M1005000</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2019-03-11T10:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784814#M1005001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would start by getting rid of &lt;/P&gt;&lt;P&gt;access-list hk permit icmp 192.168.70.0 255.255.255.0 192.168.71.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;as it is not needed and the acl's should be mirrors of eachother on the two fw's.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 12:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784814#M1005001</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-09T12:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784815#M1005002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yea I did that, same problem.  I only put it in there to test something and forgot to take it out.  Still not working though. ;/&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 12:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784815#M1005002</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T12:44:50Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784816#M1005004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try making 2 separate acl's for your europe fw, one for nat exemption and one for crypto, don't use 101 for both.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 12:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784816#M1005004</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-09T12:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784817#M1005005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yup tried that also...only reason I tried the same one for both was because it wasn't working.  Anyway I just switched it back to seperate ACls, still same problem:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list london-nat extended permit ip 192.168.71.0 255.255.255.0 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list london-nat extended permit ip 10.24.1.0 255.255.255.0 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list london-nat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 12:57:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784817#M1005005</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T12:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784818#M1005006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you mean 10.20.1.0?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 13:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784818#M1005006</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-09T13:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784819#M1005007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yea typo &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  Been working on this too many hours:)  Fixed it but still same problem...I'm getting these messages in syslog when trying to connect though:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when initiated from europe:&lt;/P&gt;&lt;P&gt;10.20.1.254,May 08 2007 14:05:57: %PIX-6-609001: Built local-host inside:10.20.1.250&lt;/P&gt;&lt;P&gt;10.20.1.254,May 08 2007 14:05:57: %PIX-6-305011: Built dynamic TCP translation from inside:10.20.1.250/50498 to outside:172.16.71.100/1381&lt;/P&gt;&lt;P&gt;10.20.1.254,May 08 2007 14:05:57: %PIX-6-302013: Built outbound TCP connection 591 for outside:192.168.70.253/23 (192.168.70.253/23) to inside:10.20.1.250/50498 (172.16.71.100/1381)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when intiated from london:&lt;/P&gt;&lt;P&gt;192.168.70.100,%PIX-6-302013: Built outbound TCP connection 19183 for outside:10.20.1.250/23 (10.20.1.250/23) to inside:192.168.70.253/63170 (192.168.70.253/63170)&lt;/P&gt;&lt;P&gt;10.20.1.254,May 08 2007 14:06:27: %PIX-6-302014: Teardown TCP connection 591 for outside:192.168.70.253/23 to inside:10.20.1.250/50498 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;10.20.1.254,May 08 2007 14:06:57: %PIX-6-305012: Teardown dynamic TCP translation from inside:10.20.1.250/50498 to outside:172.16.71.100/1381 duration 0:01:00&lt;/P&gt;&lt;P&gt;10.20.1.254,May 08 2007 14:06:57: %PIX-6-609002: Teardown local-host inside:10.20.1.250 duration 0:01:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doesn't look like the traffic is actually crossing the tunnel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 13:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784819#M1005007</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T13:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784820#M1005008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is 172.16.71.100, pat address? It seems like nat exemption is not working at europe fw.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 13:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784820#M1005008</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-09T13:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784821#M1005009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that's the DMZ side of the FW in europe...I just tried from another host that definetly doesn't attempt any dmz connections to see if I see any translations created:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;europeSW-01's IP is 192.168.71.200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;europeSW-01#telnet 192.168.70.200&lt;/P&gt;&lt;P&gt;Trying 192.168.70.200 ...&lt;/P&gt;&lt;P&gt;% Connection timed out; remote host not responding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EUROPE-FW-01# sh log | i 70.200&lt;/P&gt;&lt;P&gt;May 08 2007 14:46:21: %PIX-6-609001: Built local-host outside:192.168.70.200&lt;/P&gt;&lt;P&gt;May 08 2007 14:46:21: %PIX-6-609002: Teardown local-host outside:192.168.70.200&lt;/P&gt;&lt;P&gt;duration 0:00:00&lt;/P&gt;&lt;P&gt;May 08 2007 14:46:25: %PIX-6-609001: Built local-host outside:192.168.70.200&lt;/P&gt;&lt;P&gt;May 08 2007 14:46:25: %PIX-6-609002: Teardown local-host outside:192.168.70.200&lt;/P&gt;&lt;P&gt;duration 0:00:00&lt;/P&gt;&lt;P&gt;EUROPE-FW-01# sh log | i 71.200&lt;/P&gt;&lt;P&gt;May 08 2007 14:46:33: %PIX-6-609001: Built local-host inside:192.168.71.200&lt;/P&gt;&lt;P&gt;May 08 2007 14:46:33: %PIX-6-609002: Teardown local-host inside:192.168.71.200 d&lt;/P&gt;&lt;P&gt;uration 0:00:00&lt;/P&gt;&lt;P&gt;EUROPE-FW-01# sh xlate | i 71.200&lt;/P&gt;&lt;P&gt;EUROPE-FW-01#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 13:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784821#M1005009</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T13:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784822#M1005010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Doesn't this mean that 10.20.1.250 is being translated to 172.16.71.100?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Built dynamic TCP translation from inside:10.20.1.250/50498 to outside:172.16.71.100/1381 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 13:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784822#M1005010</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-09T13:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784823#M1005011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yea that was before I corrected the 10.24 acl...here's the new syslogs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2007-05-09 11:10:36,Local4.Info,10.20.1.254,May 08 2007 15:10:57: %PIX-6-609001: Built local-host inside:10.20.1.250&lt;/P&gt;&lt;P&gt;2007-05-09 11:10:36,Local4.Info,10.20.1.254,May 08 2007 15:10:57: %PIX-6-609002: Teardown local-host inside:10.20.1.250 duration 0:00:00&lt;/P&gt;&lt;P&gt;2007-05-09 11:10:38,Local4.Info,10.20.1.254,May 08 2007 15:10:59: %PIX-6-609001: Built local-host inside:10.20.1.250&lt;/P&gt;&lt;P&gt;2007-05-09 11:10:38,Local4.Info,10.20.1.254,May 08 2007 15:10:59: %PIX-6-302020: Built ICMP connection for faddr 192.168.70.253/0 gaddr 10.20.1.250/28 laddr 10.20.1.250/28&lt;/P&gt;&lt;P&gt;2007-05-09 11:10:46,Local4.Info,10.20.1.254,May 08 2007 15:11:07: %PIX-6-302021: Teardown ICMP connection for faddr 192.168.70.253/0 gaddr 10.20.1.250/28 laddr 10.20.1.250/28&lt;/P&gt;&lt;P&gt;2007-05-09 11:10:46,Local4.Info,10.20.1.254,May 08 2007 15:11:07: %PIX-6-609002: Teardown local-host inside:10.20.1.250 duration 0:00:08&lt;/P&gt;&lt;P&gt;2007-05-09 11:10:52,Local4.Info,10.20.1.254,May 08 2007 15:11:12: %PIX-6-609001: Built local-host inside:10.20.1.250&lt;/P&gt;&lt;P&gt;2007-05-09 11:10:52,Local4.Info,10.20.1.254,May 08 2007 15:11:12: %PIX-6-302013: Built outbound TCP connection 1202 for outside:192.168.70.253/23 (192.168.70.253/23) to inside:10.20.1.250/46402 (10.20.1.250/46402)&lt;/P&gt;&lt;P&gt;007-05-09 11:11:22,Local4.Info,10.20.1.254,May 08 2007 15:11:42: %PIX-6-302014: Teardown TCP connection 1202 for outside:192.168.70.253/23 to inside:10.20.1.250/46402 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;2007-05-09 11:11:22,Local4.Info,10.20.1.254,May 08 2007 15:11:42: %PIX-6-609002: Teardown local-host inside:10.20.1.250 duration 0:00:30&lt;/P&gt;&lt;P&gt;2007-05-09 11:12:28,Local4.Info,10.20.1.254,May 08 2007 15:12:49: %PIX-6-609001: Built local-host inside:10.20.1.250&lt;/P&gt;&lt;P&gt;2007-05-09 11:12:28,Local4.Info,10.20.1.254,May 08 2007 15:12:49: %PIX-6-302013: Built outbound TCP connection 1223 for outside:192.168.70.253/23 (192.168.70.253/23) to inside:10.20.1.250/28994 (10.20.1.250/28994)&lt;/P&gt;&lt;P&gt;2007-05-09 11:12:58,Local4.Info,10.20.1.254,May 08 2007 15:13:19: %PIX-6-302014: Teardown TCP connection 1223 for outside:192.168.70.253/23 to inside:10.20.1.250/28994 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;2007-05-09 11:12:58,Local4.Info,10.20.1.254,May 08 2007 15:13:19: %PIX-6-609002: Teardown local-host inside:10.20.1.250 duration 0:00:30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 14:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784823#M1005011</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T14:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784824#M1005012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm starting to think the problem is on the dmz router...here's the setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;londonfw-dmzrouter-internet-europterouter-eurotefw&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting these messages on the london router (the source and dest addresses are correct):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 172.16.70.100 500 ***** 500 extendable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.May  9 15:35:11.019: %CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet ha&lt;/P&gt;&lt;P&gt;s invalid spi for&lt;/P&gt;&lt;P&gt;        destaddr=*****, prot=50, spi=0x35B97736(901347126), srcaddr=*****&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 14:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784824#M1005012</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T14:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784825#M1005013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just found this config left out by the previous engineer on the london router...I'm guessing this is conflicting.  I'll try to remove the crypto map later on tonight and see if it works:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; ip address ****** 255.255.255.248&lt;/P&gt;&lt;P&gt; ip access-group 130 in&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip route-cache flow&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map vpntunnel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 14:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784825#M1005013</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T14:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784826#M1005014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yup that's what it was..gotta love old left over configs from ages ago that never get removed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 17:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784826#M1005014</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T17:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784827#M1005015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I got a new problem...now the tunnel gets created fine no matter where I initiate traffic from...however, if I initiate the traffic from london, after the tunnel gets created no traffic is able to pass through the tunnel.  As soon as I send any kind of traffic out from europe everything works fine both ways.  Any ideas why that would happen?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 22:28:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784827#M1005015</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-09T22:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784828#M1005016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok this is starting to drive me crazy I think.  It looks like I have to initiate interesting traffic from both ends before the connection actually works.  On the London router (not the FW) I'm getting these messages:&lt;/P&gt;&lt;P&gt;May 10 17:16:42.170: %CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet has&lt;/P&gt;&lt;P&gt; invalid spi for&lt;/P&gt;&lt;P&gt;        destaddr=*.*.*.*, prot=50, spi=0x354F6836(894396470), srcaddr=*.*.*.*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using a static nat on that router for the fw (the public IP is the same as the outside interface):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 172.16.70.100 500 217.196.246.234 500 extendable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2007 16:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784828#M1005016</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-10T16:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784829#M1005017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OKay i will try to rebuild your configuration also for your case do try to clear crypto ipsec sa and clear crypto isakmp sa and try setting up the tunnel and see if traffic is flowing through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname europe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.71.0 255.255.255.0 192.168.70.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.20.1.0 255.255.255.0 192.168.70.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group 100 in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.x.x.x 1(Make sure your routing is good)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set RTS esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df outside&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 match address nonat&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 set peer &lt;PEERPUBLICADDRLON&gt;&lt;/PEERPUBLICADDRLON&gt;&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 set transform-set RTS&lt;/P&gt;&lt;P&gt;crypto map forsberg interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 65535 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 65535 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 65535 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 65535 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 65535 lifetime 86400&lt;/P&gt;&lt;P&gt;!            &lt;/P&gt;&lt;P&gt;tunnel-group &lt;PEERPUBLICADDRLON&gt; type ipsec-l2l&lt;/PEERPUBLICADDRLON&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;PEERPUBLICADDRLON&gt; ipsec-attributes&lt;/PEERPUBLICADDRLON&gt;&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;$$$$$$$$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname europe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.70.0 255.255.255.0 192.168.71.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit 192.168.70.0 255.255.255.0 10.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group 100 in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.x.x.x 1(Make sure your routing is good)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set RTS esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df outside&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 match address nonat&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 set peer &lt;PEERPUBLICADDREUROPE&gt;&lt;/PEERPUBLICADDREUROPE&gt;&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 set transform-set RTS&lt;/P&gt;&lt;P&gt;crypto map forsberg interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 65535 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 65535 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 65535 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 65535 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 65535 lifetime 86400&lt;/P&gt;&lt;P&gt;!            &lt;/P&gt;&lt;P&gt;tunnel-group &lt;PEERPUBLICADDREUROPE&gt; type ipsec-l2l&lt;/PEERPUBLICADDREUROPE&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;PEERPUBLICADDREUROPE&gt; ipsec-attributes&lt;/PEERPUBLICADDREUROPE&gt;&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;###########################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing to notice the extra intresting traffic from London to europe PIX, if you notice in Europe you dont have it marked as interesting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Hoogen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2007 17:10:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784829#M1005017</guid>
      <dc:creator>hoogen_82</dc:creator>
      <dc:date>2007-05-10T17:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784830#M1005018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oops lots of changes before i could post mine. Well do you have a diagram and what are you trying to achieve..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Hoogen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2007 17:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784830#M1005018</guid>
      <dc:creator>hoogen_82</dc:creator>
      <dc:date>2007-05-10T17:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784831#M1005019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's a diagram I just put together of the setup.  All I want to do is have the London LAN communicate with the Europe LAN.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2007 18:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784831#M1005019</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-05-10T18:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2L</title>
      <link>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784832#M1005020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay this should be your config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname europe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.71.0 255.255.255.0 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.20.1.0 255.255.255.0 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group 100 in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.x.x.x 1(Make sure your routing is good)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set RTS esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df outside&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 match address nonat&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 set peer 172.16.70.100&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 set transform-set RTS&lt;/P&gt;&lt;P&gt;crypto map forsberg interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 65535 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 65535 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 65535 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 65535 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 65535 lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tunnel-group 172.16.70.100 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 172.16.70.100 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;$$$$$$$$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname europe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.70.0 255.255.255.0 192.168.71.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit 192.168.70.0 255.255.255.0 10.20.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group 100 in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.71.253&lt;A little="" odd="" since="" on="" both="" your="" routers="" you="" have="" the="" same="" ip=""&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set RTS esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df outside&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 match address nonat&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 set peer 172.16.71.100&lt;/P&gt;&lt;P&gt;crypto map forsberg 21 set transform-set RTS&lt;/P&gt;&lt;P&gt;crypto map forsberg interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 65535 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 65535 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 65535 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 65535 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 65535 lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tunnel-group 172.16.71.100 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group  172.16.71.100 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;###########################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THe above config should work good. Just confused about the Ip'S on your routers though, let your routers only do routing, leave the firewall portforwarding tunnel stuff to the pix. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Hoogen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2007 18:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-l2l/m-p/784832#M1005020</guid>
      <dc:creator>hoogen_82</dc:creator>
      <dc:date>2007-05-10T18:16:38Z</dc:date>
    </item>
  </channel>
</rss>

