<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Version 9.1(2)!hostname in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948732#M150057</link>
    <description>&lt;P&gt;InfinityASA# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(2)&lt;BR /&gt;!&lt;BR /&gt;hostname InfinityASA&lt;BR /&gt;domain-name infinityfutures&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif ouside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 50.235.136.XXX 255.255.255.2XX&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 0&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name infinityfutures&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NETWORK_OBJ_10.0.0.0_8&lt;BR /&gt; subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.2.0_24&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object icmp6&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object icmp6&lt;BR /&gt;object-group network LOCAL-LAN&lt;BR /&gt; network-object object NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt; network-object object NETWORK_OBJ_192.168.2.0_24&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any any&lt;BR /&gt;access-list ouside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any&lt;BR /&gt;access-list ouside_cryptomap extended permit ip object NETWORK_OBJ_192.168.1.0_24 object NETWORK_OBJ_10.0.0.0_8&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu ouside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,ouside) source static LOCAL-LAN LOCAL-LAN destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;nat (inside,ouside) after-auto source dynamic any interface&lt;BR /&gt;access-group ouside_access_in in interface ouside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route ouside 0.0.0.0 0.0.0.0 50.235.136.97 1&lt;BR /&gt;route inside 192.168.0.0 255.255.0.0 192.168.2.1 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 192.168.2.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;</description>
    <pubDate>Mon, 12 Sep 2016 19:10:17 GMT</pubDate>
    <dc:creator>shamsul77</dc:creator>
    <dc:date>2016-09-12T19:10:17Z</dc:date>
    <item>
      <title>Cisco ASA 9.1 Site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948726#M150049</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Currently I'm trying to establish site to site vpn connection between my two asa (9.1). I tried to run site to site vpn wizard and upon setup completed I do not see any active VPN session on monitoring windows.. I do not see any session on my both Cisco ASA. Attached is the screenshot of my ASA ASDM.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are the detail of my ASA detail:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;SPAN&gt;ASA 1&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ouside interface: 50.235.136.XXX&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Inside Interface: 192.168.2.3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Local network which i want to allow to connect&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Local Network: &lt;STRONG&gt;&lt;EM&gt;192.168.1.0 / 255.255.255.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Remote Network which i want to connect&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Remote Network: &lt;EM&gt;&lt;STRONG&gt;10.0.0.0 / 255.0.0.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;SPAN&gt;&lt;STRONG&gt;ASA 2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ouside interface:&amp;nbsp;208.97.252.XXX&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;inside interface: 10.5.0.3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Local network which i want to allow to connect&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Local Network:&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;10.0.0.0 / 255.0.0.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Remote Network which i want to connect&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Remote Network: 192.168.1.0 / 255.255.255.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;############################################################################&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;Basically my network being layout as below&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;Core switch (L3) for office 1 (Cisco ASA1) :&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;VLAN 100 :192.168.1.0 / 255.255.255.0 (DHCP)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;VLAN 101 : 192.168.2.0 /255.255.255.0 (Static)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;&lt;STRONG&gt;Cisco ASA1 connected to Core switch on VLAN 101&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;Core switch (L3) for office 2 (Cisco ASA 2) :&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;VLAN 100 :10.0.52.0 / 255.255.255.0 (DHCP)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;VLAN 101 :10.2.55.0 /255.255.255.0 (DHCP)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;VLAN 102 : 10.5.0.3 /255.255.255.0 (Static)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;&lt;STRONG&gt;Cisco ASA2 connected to Core switch on VLAN 103&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;From ASA2 I want to connect network on Cisco ASA1 and ASA1 to ASA2 network.&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;#####################################################################&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;InfinityASA# sh crypto isakmp sa&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;There are no IKEv1 SAs&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;There are no IKEv2 SAs&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please do let me know if anything wrong here so that i can correct it. Thank you for the help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948726#M150049</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2019-03-12T08:15:39Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948727#M150051</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;First of all, on ASA 1, your local network is 192.168.1.0/24 but inside is 192.168.2.0 network. Is it a miss spelling error or 192.168.1.0/24 is behind your inside?&lt;/P&gt;
&lt;P&gt;Other question: on ASA 2, your inside IP is 10.5.0.0 network. Why setting remote network as 10.0.0.0/8? Is there any other 10 network behind your ASA you want to be able to reach?&lt;/P&gt;
&lt;P&gt;Then, could you share the other config part of the VPN (like nat, crypto) ?&lt;/P&gt;
&lt;P&gt;When you try a ping 192.168.1.x from ASA 2, what logs you see on ASA 1 and ASA 2?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 17:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948727#M150051</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-09-12T17:56:09Z</dc:date>
    </item>
    <item>
      <title>Basically my network being</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948728#M150053</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;Basically my network being layout as below&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;Core switch (L3) for office 1 (Cisco ASA1) : &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;VLAN 100 :192.168.1.0 / 255.255.255.0 (DHCP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;VLAN 101 : 192.168.2.0 /255.255.255.0 (Static)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff; font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;Cisco ASA1 connected to Core switch on VLAN 101&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;Core switch (L3) for office 2 (Cisco ASA 2) :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;VLAN 100 :10.0.52.0 / 255.255.255.0 (DHCP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;&lt;SPAN&gt;VLAN 101 :10.2.55.0 /255.255.255.0 (DHCP)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;VLAN 102 : 10.5.0.3 /255.255.255.0 (Static)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #008080; font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;Cisco ASA2 connected to Core switch on VLAN 103&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From ASA2 I want to connect network on Cisco ASA1 and ASA1 to ASA2 network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 18:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948728#M150053</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-12T18:19:00Z</dc:date>
    </item>
    <item>
      <title>Ok for networks. Did you do</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948729#M150054</link>
      <description>&lt;P&gt;Ok for networks. Did you do ping tests and check logs?&lt;/P&gt;
&lt;P&gt;Could you share config of full vpn like nat, crypto?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 18:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948729#M150054</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-09-12T18:20:21Z</dc:date>
    </item>
    <item>
      <title>InfinityASA# sh run: Saved</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948730#M150055</link>
      <description>&lt;P&gt;InfinityASA# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(2)&lt;BR /&gt;!&lt;BR /&gt;hostname InfinityASA&lt;BR /&gt;domain-name infinity&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;
&lt;P&gt;ASA Version 9.1(2)&lt;BR /&gt;!&lt;BR /&gt;hostname InfinityASA&lt;BR /&gt;domain-name infinityfutures&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif ouside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 50.235.136.X 255.255.255.2XX&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 0&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name infinityfutures&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NETWORK_OBJ_10.0.0.0_8&lt;BR /&gt; subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.2.0_24&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object icmp6&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object icmp6&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any any&lt;BR /&gt;access-list ouside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any&lt;BR /&gt;access-list ouside_cryptomap extended permit ip 192.168.2.0 255.255.255.0 object NETWORK_OBJ_10.0.0.0_8&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu ouside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,ouside) source static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;nat (inside,ouside) after-auto source dynamic any interface&lt;BR /&gt;access-group ouside_access_in in interface ouside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route ouside 0.0.0.0 0.0.0.0 50.235.136.XXX 1&lt;BR /&gt;route inside 192.168.0.0 255.255.0.0 192.168.2.1 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 192.168.2.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal INFINITY&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map ouside_map 1 match address ouside_cryptomap&lt;BR /&gt;crypto map ouside_map 1 set peer 208.97.252.XXX&lt;BR /&gt;crypto map ouside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map ouside_map 1 set ikev2 ipsec-proposal INFINITY DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map ouside_map interface ouside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption des&lt;BR /&gt; integrity md5&lt;BR /&gt; group 2&lt;BR /&gt; prf sha md5&lt;BR /&gt; lifetime seconds 28800&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable ouside&lt;BR /&gt;crypto ikev1 enable ouside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 208.97.252.224 255.255.255.224 ouside&lt;BR /&gt;ssh 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy GroupPolicy_208.97.252.XXx internal&lt;BR /&gt;group-policy GroupPolicy_208.97.252.XXX attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt;username shamsul password 2naxJ/VF.PmiRbL1 encrypted privilege 15&lt;BR /&gt;tunnel-group 208.97.252.238 type ipsec-l2l&lt;BR /&gt;tunnel-group 208.97.252.238 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_208.97.252.XXX&lt;BR /&gt;tunnel-group 208.97.252.XXX ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 18:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948730#M150055</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-12T18:31:25Z</dc:date>
    </item>
    <item>
      <title>I'm reading it quickly</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948731#M150056</link>
      <description>&lt;P&gt;I'm reading it quickly through my iphone and I see an issue on your nat exempt rule:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;nat (inside,ouside) source static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You're using the object NETWORK_OBJ_192.168.2.0_24 which refers to 192.168.2.0/24 and not your 192.168.1.0/24 network.&lt;/P&gt;
&lt;P&gt;Could you modify it and try again?&lt;/P&gt;
&lt;P&gt;You can add modify it like that:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; subnet 192.168.1.0 255.255.255.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object-group network LOCAL-LAN&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp; network-object object NETWORK_OBJ_192.168.1.0_24&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp; network-object object NETWORK_OBJ_192.168.2.0_24&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;no nat (inside,ouside) source static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;nat (inside,ouside) source static LOCAL-LAN LOCAL-LAN destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 18:55:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948731#M150056</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-09-12T18:55:01Z</dc:date>
    </item>
    <item>
      <title>ASA Version 9.1(2)!hostname</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948732#M150057</link>
      <description>&lt;P&gt;InfinityASA# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(2)&lt;BR /&gt;!&lt;BR /&gt;hostname InfinityASA&lt;BR /&gt;domain-name infinityfutures&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif ouside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 50.235.136.XXX 255.255.255.2XX&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 0&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name infinityfutures&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NETWORK_OBJ_10.0.0.0_8&lt;BR /&gt; subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.2.0_24&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object icmp6&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object icmp6&lt;BR /&gt;object-group network LOCAL-LAN&lt;BR /&gt; network-object object NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt; network-object object NETWORK_OBJ_192.168.2.0_24&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any any&lt;BR /&gt;access-list ouside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any&lt;BR /&gt;access-list ouside_cryptomap extended permit ip object NETWORK_OBJ_192.168.1.0_24 object NETWORK_OBJ_10.0.0.0_8&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu ouside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,ouside) source static LOCAL-LAN LOCAL-LAN destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;nat (inside,ouside) after-auto source dynamic any interface&lt;BR /&gt;access-group ouside_access_in in interface ouside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route ouside 0.0.0.0 0.0.0.0 50.235.136.97 1&lt;BR /&gt;route inside 192.168.0.0 255.255.0.0 192.168.2.1 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 192.168.2.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 19:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948732#M150057</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-12T19:10:17Z</dc:date>
    </item>
    <item>
      <title>As you paste again your</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948733#M150058</link>
      <description>&lt;P&gt;As you paste again your config, that says it's not working?&lt;/P&gt;
&lt;P&gt;What about the config of the other end ASA? Just attach the txt file please.&lt;/P&gt;
&lt;P&gt;What do you see on logs?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 19:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948733#M150058</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-09-12T19:41:33Z</dc:date>
    </item>
    <item>
      <title>attached is ASA 2 config. I'm</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948734#M150060</link>
      <description>&lt;P&gt;attached is ASA 2 config. I'm finally able to connect both ASA now.. &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; but im not able to ping any of ip on ASA2 from ASA1 and ASA1 to ASA2 network.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 20:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948734#M150060</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-12T20:12:25Z</dc:date>
    </item>
    <item>
      <title>My current site to site</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948735#M150061</link>
      <description>&lt;P&gt;My current site to site connection session as attached screenshot.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 20:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948735#M150061</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-12T20:17:07Z</dc:date>
    </item>
    <item>
      <title>You can get full config file</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948736#M150063</link>
      <description>&lt;P&gt;You can get full config file for both ASA on my initial post. Please scroll up.&lt;/P&gt;
&lt;P&gt;Right now im able to see active site to site vpn connection as below.. but not able to ping any network from ASA1 to ASA2 network.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://s17.postimg.org/csu30lt1b/Capture.jpg" alt="Site to site vpn tunnel active session" width="1280" height="500" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 20:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948736#M150063</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-12T20:22:03Z</dc:date>
    </item>
    <item>
      <title>Ok from ASA2 you can reach</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948737#M150064</link>
      <description>&lt;P&gt;Ok from ASA2 you can reach 192.168.1.x, right?&lt;/P&gt;
&lt;P&gt;Now what are you trying to do? Could you test ping ASA2 lan from your 192.168.1.0 subnet and tell me if it works?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 22:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948737#M150064</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-09-12T22:23:29Z</dc:date>
    </item>
    <item>
      <title>From ASA2 to ASA1 ping 192</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948738#M150065</link>
      <description>&lt;P&gt;From ASA2 to ASA1 ping 192.168.1.1 gateway failed&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;CISCOASA5508-X# ping 192.168.1.1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;Type escape sequence to abort.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;?????&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'book antiqua', palatino, serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;Success rate is 0 percent (0/5)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I'm not able to ping any of segment from ASA1 to ASA2 network and ASA2 to ASA1 network.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 23:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948738#M150065</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-12T23:09:58Z</dc:date>
    </item>
    <item>
      <title>Can you please advice how to</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948739#M150066</link>
      <description>&lt;P&gt;Can you please advice how to check site to site vpn connection status? when i try to execute below command it do not show any thing except below output&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: symbol;"&gt;&lt;EM&gt;CISCOASA5508-X# show crypto ipsec sa&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: symbol;"&gt;&lt;EM&gt;There are no ipsec sas&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: symbol;"&gt;&lt;EM&gt;CISCOASA5508-X# sh crypto isakmp sa&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: symbol;"&gt;&lt;EM&gt;There are no IKEv1 SAs&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: symbol;"&gt;&lt;EM&gt;There are no IKEv2 SAs&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 23:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948739#M150066</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-12T23:21:48Z</dc:date>
    </item>
    <item>
      <title>Please try directly from a</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948740#M150067</link>
      <description>&lt;P&gt;Please try directly from a host on your lan on both side (don't ping asa) and take logs to see what asa says&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2016 01:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948740#M150067</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-09-13T01:38:17Z</dc:date>
    </item>
    <item>
      <title>Also on ASA 1, the crypto map</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948741#M150068</link>
      <description>&lt;P&gt;Also on ASA 1, the crypto map acl is based only on 192.168.2.0/24. You're missing the 192.168.1.0/24. Add it on the acl&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list ouside_cryptomap extended permit ip 192.168.2.0 255.255.255.0 object NETWORK_OBJ_10.0.0.0_8&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2016 01:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948741#M150068</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-09-13T01:42:28Z</dc:date>
    </item>
    <item>
      <title>I'm still not able to connect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948742#M150069</link>
      <description>&lt;P&gt;I'm still not able to connect the vpn. Attached is my latest config for both ASA1 and ASA2. you help highly appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 15:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948742#M150069</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-15T15:45:01Z</dc:date>
    </item>
    <item>
      <title>Wohooooo... I solved the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948743#M150070</link>
      <description>&lt;P&gt;Wohooooo... I solved the issue.. Thanks for your guide buddy.. really appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 16:19:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948743#M150070</guid>
      <dc:creator>shamsul77</dc:creator>
      <dc:date>2016-09-15T16:19:54Z</dc:date>
    </item>
    <item>
      <title>You're welcome</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948744#M150071</link>
      <description>&lt;P&gt;You're welcome&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 16:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-site-to-site-vpn/m-p/2948744#M150071</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-09-15T16:59:46Z</dc:date>
    </item>
  </channel>
</rss>

