<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Initiate a ping again andshow in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719919#M191783</link>
    <description>&lt;P&gt;Initiate a ping again and&lt;/P&gt;&lt;P&gt;show crypto ipsec sa&lt;/P&gt;</description>
    <pubDate>Sun, 10 May 2015 17:43:34 GMT</pubDate>
    <dc:creator>ROHIT SHARMA</dc:creator>
    <dc:date>2015-05-10T17:43:34Z</dc:date>
    <item>
      <title>ASA 8.4 IPSec-L2L VPN 1-Way communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719907#M191763</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am currently trying to configure a Site-to-Site VPN tunnel and have seemed to stumbled into a problem. I appear to only be able to communicate in 1 direction, my 10.1.1.x clients are able to ping clients on the 192.168.135.x network; however, the 192.168.135.x clients are not able to ping clients on the 10.1.1.x network.&lt;/P&gt;&lt;P&gt;Topology&lt;/P&gt;&lt;P&gt;10.1.1.x/24 inside(ASA1)outside ===VPN===outside(ASA2)inside 192.168.135.x/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure which all outputs will be valuable to you to assist so let me know if I'm missing anything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA1&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh run nat&lt;BR /&gt;nat (inside,outside) source static local-nets local-nets destination static vpn-nets vpn-nets no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run route&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.X 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set triplesha esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set aes256sha esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto map vpnmap 120 match address outbound&lt;BR /&gt;crypto map vpnmap 120 set peer X.X.X.X&lt;BR /&gt;crypto map vpnmap 120 set ikev1 transform-set triplesha&lt;BR /&gt;crypto map vpnmap interface outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA2&lt;/P&gt;&lt;P&gt;PT-Hold-ASA5505# sh run nat&lt;BR /&gt;nat (inside,outside) source static local-nets local-nets destination static vpn-nets vpn-nets no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;PT-Hold-ASA5505# sh run route&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.X 1&lt;/P&gt;&lt;P&gt;crypto map vpnmap 120 match address robASA&lt;BR /&gt;crypto map vpnmap 120 set peer X.X.X.X&lt;BR /&gt;crypto map vpnmap 120 set ikev1 transform-set aes256sha triplesha&lt;BR /&gt;crypto map vpnmap 255 ipsec-isakmp dynamic dynmap&lt;BR /&gt;crypto map vpnmap interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for any help you have to offer, I'm not very familiar with ASA's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719907#M191763</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2019-03-12T05:54:26Z</dc:date>
    </item>
    <item>
      <title>Hello Robert,Is it possible</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719908#M191764</link>
      <description>&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;Is it possible for you to paste complete config here?&lt;/P&gt;&lt;P&gt;This problem is generally due to NAT or routing issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2015 20:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719908#M191764</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-08T20:34:12Z</dc:date>
    </item>
    <item>
      <title>Sure,Here is ASA1: Saved:ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719909#M191767</link>
      <description>&lt;P&gt;Sure,&lt;/P&gt;&lt;P&gt;Here is ASA1&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(6)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 173.X.X.X 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa846-k8.bin&lt;BR /&gt;boot system disk0:/asa847-28-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group network private-nets&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 127.0.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 0.0.0.0&lt;BR /&gt;object-group network local-nets&lt;BR /&gt;&amp;nbsp;network-object 10.1.1.0 255.255.255.0&lt;BR /&gt;object-group network hf-nets&lt;BR /&gt;&amp;nbsp;network-object 192.168.135.0 255.255.255.0&lt;BR /&gt;object-group network vpn-nets&lt;BR /&gt;&amp;nbsp;group-object hf-nets&lt;BR /&gt;object-group service blocked-udp udp&lt;BR /&gt;&amp;nbsp;port-object range 135 139&lt;BR /&gt;&amp;nbsp;port-object eq snmp&lt;BR /&gt;object-group service blocked-tcp tcp&lt;BR /&gt;&amp;nbsp;port-object range 135 netbios-ssn&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;&amp;nbsp;port-object eq 445&lt;BR /&gt;&amp;nbsp;port-object eq 593&lt;BR /&gt;access-list outbound extended permit ip object-group local-nets object-group hf-nets&lt;BR /&gt;access-list outboundtraffic extended permit ip object-group local-nets object-group vpn-nets&lt;BR /&gt;access-list outboundtraffic extended deny udp any any object-group blocked-udp&lt;BR /&gt;access-list outboundtraffic extended deny tcp any any object-group blocked-tcp&lt;BR /&gt;access-list outboundtraffic extended permit ip object-group local-nets any&lt;BR /&gt;access-list holdingford extended permit ip object-group local-nets object-group hf-nets&lt;BR /&gt;access-list inboundtraffic extended deny ip object-group private-nets any&lt;BR /&gt;access-list inboundtraffic extended permit icmp any any echo&lt;BR /&gt;access-list inboundtraffic extended permit icmp any any echo-reply&lt;BR /&gt;access-list inboundtraffic extended permit icmp any any time-exceeded&lt;BR /&gt;access-list bypassnat extended permit ip object-group local-nets object-group vpn-nets&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static local-nets local-nets destination static vpn-nets vpn-nets no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 173.X.X.X 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt connection tcpmss 1180&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set triplesha esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set aes256sha esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto map vpnmap 120 match address outbound&lt;BR /&gt;crypto map vpnmap 120 set peer 208.X.X.X&lt;BR /&gt;crypto map vpnmap 120 set ikev1 transform-set triplesha&lt;BR /&gt;crypto map vpnmap interface outside&lt;BR /&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.135.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 173.X.X.X 173.X.X.X&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.1.1.5-10.1.1.15 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption aes128-sha1 3des-sha1 aes256-sha1&lt;BR /&gt;webvpn&lt;BR /&gt;tunnel-group 208.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group 208.X.X.X ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:6d579c34db053bd2b38bcf0a40cdebc8&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA2&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(6)5&lt;BR /&gt;!&lt;BR /&gt;hostname PT-Hold-ASA5505&lt;BR /&gt;domain-name XXXXXXXX&lt;BR /&gt;enable password ppn/h7gQhH2MPtdi encrypted&lt;BR /&gt;passwd ppn/h7gQhH2MPtdi encrypted&lt;BR /&gt;no names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.135.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 208.X.X.X 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name XXXXXXXXX&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group network private-nets&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 127.0.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 0.0.0.0&lt;BR /&gt;object-group network local-nets&lt;BR /&gt;&amp;nbsp;network-object 192.168.135.0 255.255.255.0&lt;BR /&gt;object-group network opole-nets&lt;BR /&gt;&amp;nbsp;network-object 192.168.110.0 255.255.255.0&lt;BR /&gt;object-group network client-nets&lt;BR /&gt;&amp;nbsp;network-object 192.168.254.0 255.255.255.0&lt;BR /&gt;object-group network robASA-nets&lt;BR /&gt;&amp;nbsp;network-object 10.1.1.0 255.255.255.0&lt;BR /&gt;object-group network vpn-nets&lt;BR /&gt;&amp;nbsp;group-object client-nets&lt;BR /&gt;&amp;nbsp;group-object opole-nets&lt;BR /&gt;&amp;nbsp;group-object robASA-nets&lt;BR /&gt;object-group service blocked-udp udp&lt;BR /&gt;&amp;nbsp;port-object range 135 139&lt;BR /&gt;&amp;nbsp;port-object eq snmp&lt;BR /&gt;object-group service blocked-tcp tcp&lt;BR /&gt;&amp;nbsp;port-object range 135 netbios-ssn&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;&amp;nbsp;port-object eq 445&lt;BR /&gt;&amp;nbsp;port-object eq 593&lt;BR /&gt;access-list opole extended permit ip object-group local-nets object-group opole-nets&lt;BR /&gt;access-list inboundtraffic extended deny ip object-group private-nets any&lt;BR /&gt;access-list inboundtraffic extended permit icmp any any echo&lt;BR /&gt;access-list inboundtraffic extended permit icmp any any echo-reply&lt;BR /&gt;access-list inboundtraffic extended permit icmp any any time-exceeded&lt;BR /&gt;access-list outboundtraffic extended permit ip object-group local-nets object-group vpn-nets&lt;BR /&gt;access-list outboundtraffic extended deny udp any any object-group blocked-udp&lt;BR /&gt;access-list outboundtraffic extended deny tcp any any object-group blocked-tcp&lt;BR /&gt;access-list outboundtraffic extended permit ip object-group local-nets any&lt;BR /&gt;access-list clientmatch extended permit ip object-group local-nets object-group client-nets&lt;BR /&gt;access-list robASA extended permit ip object-group local-nets object-group robASA-nets&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;no logging message 305012&lt;BR /&gt;no logging message 305011&lt;BR /&gt;no logging message 715075&lt;BR /&gt;no logging message 715047&lt;BR /&gt;no logging message 715046&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 304001&lt;BR /&gt;no logging message 715036&lt;BR /&gt;no logging message 713236&lt;BR /&gt;no logging message 609002&lt;BR /&gt;no logging message 609001&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool vpnpool 192.168.254.1-192.168.254.126&lt;BR /&gt;ip verify reverse-path interface inside&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 300&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static local-nets local-nets destination static vpn-nets vpn-nets no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group outboundtraffic in interface inside&lt;BR /&gt;access-group inboundtraffic in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 208.X.X.X 1&lt;BR /&gt;route outside 10.1.1.0 255.255.255.0 173.X.X.X 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable XXXXX&lt;BR /&gt;http X.X.X.X X.X.X.X inside&lt;BR /&gt;http X.X.X.X X.X.X.X outside&lt;BR /&gt;http X.X.X.X X.X.X.X outside&lt;BR /&gt;http 192.168.135.0 255.255.255.0 inside&lt;BR /&gt;http X.X.X.X X.X.X.X inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt connection timewait&lt;BR /&gt;crypto ipsec ikev1 transform-set aes256sha esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set triplesha esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto dynamic-map dynmap 10 set ikev1 transform-set aes256sha&lt;BR /&gt;crypto map vpnmap 110 match address opole&lt;BR /&gt;crypto map vpnmap 110 set peer X.X.X.X&lt;BR /&gt;crypto map vpnmap 110 set ikev1 transform-set aes256sha triplesha&lt;BR /&gt;crypto map vpnmap 120 match address robASA&lt;BR /&gt;crypto map vpnmap 120 set peer 173.X.X.X&lt;BR /&gt;crypto map vpnmap 120 set ikev1 transform-set aes256sha triplesha&lt;BR /&gt;crypto map vpnmap 255 ipsec-isakmp dynamic dynmap&lt;BR /&gt;crypto map vpnmap interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca 6ecc7aa5a7032009b8cebcf4e952d491&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 308205ec 308204d4 a0030201 0202106e cc7aa5a7 032009b8 cebcf4e9 52d49130&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30303230 38303030 3030305a 170d3230 30323037 32333539 35395a30 81b5310b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 74776f72 6b313b30 39060355 040b1332 5465726d 73206f66 20757365 20617420&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 68747470 733a2f2f 7777772e 76657269 7369676e 2e636f6d 2f727061 20286329&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 3130312f 302d0603 55040313 26566572 69536967 6e20436c 61737320 33205365&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63757265 20536572 76657220 4341202d 20473330 82012230 0d06092a 864886f7&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d010101 05000382 010f0030 82010a02 82010100 b187841f c20c45f5 bcab2597&lt;BR /&gt;&amp;nbsp; &amp;nbsp; a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 9c688b2e 957b899b 13cae234 34c1f35b f3497b62 83488174 d188786c 0253f9bc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63cd1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 02030100 01a38201 df308201&lt;BR /&gt;&amp;nbsp; &amp;nbsp; db303406 082b0601 05050701 01042830 26302406 082b0601 05050730 01861868&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1d130101&lt;BR /&gt;&amp;nbsp; &amp;nbsp; ff040830 060101ff 02010030 70060355 1d200469 30673065 060b6086 480186f8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 45010717 03305630 2806082b 06010505 07020116 1c687474 70733a2f 2f777777&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2e766572 69736967 6e2e636f 6d2f6370 73302a06 082b0601 05050702 02301e1a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1c687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 03551d1f 042d302b 3029a027 a0258623 68747470 3a2f2f63 726c2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 70636133 2d67352e 63726c30 0e060355 1d0f0101 ff040403&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 02010630 6d06082b 06010505 07010c04 61305fa1 5da05b30 59305730 55160969&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6d616765 2f676966 3021301f 30070605 2b0e0302 1a04148f e5d31a86 ac8d8e6b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1b311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301d0603&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 551d0e04 1604140d 445c1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1d230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300d0609&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2a864886 f70d0101 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b2227055 d9203340 3307c265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6decd018 7d494aca 99c71928 a2bed877 24f78526 866d8705 404167d1 273aeddc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6c2527b9 deb78458 c61f381e a4c4cb66&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 43200&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 666&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet 192.168.135.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 30&lt;BR /&gt;ssh X.X.X.X X.X.X.X inside&lt;BR /&gt;ssh 192.168.135.0 255.255.255.0 inside&lt;BR /&gt;ssh X.X.X.X X.X.X.X inside&lt;BR /&gt;ssh 10.1.1.0 255.255.255.0 inside&lt;BR /&gt;ssh X.X.X.X X.X.X.X outside&lt;BR /&gt;ssh X.X.X.X X.X.X.X outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 30&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.135.101-192.168.135.200 inside&lt;BR /&gt;dhcpd dns 192.168.110.4 24.56.130.2 interface inside&lt;BR /&gt;dhcpd domain XXXXXXXl interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 192.168.110.4 source inside&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;group-policy mgmtvpn internal&lt;BR /&gt;group-policy mgmtvpn attributes&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value clientmatch&lt;BR /&gt;username ptt_it password zZLj1eRw6II4.leT encrypted privilege 15&lt;BR /&gt;username mtech password //lVvNVoVoZ8qRzR encrypted privilege 15&lt;BR /&gt;tunnel-group mgmtvpn type remote-access&lt;BR /&gt;tunnel-group mgmtvpn general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpnpool&lt;BR /&gt;&amp;nbsp;default-group-policy mgmtvpn&lt;BR /&gt;tunnel-group mgmtvpn ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group X.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group X.X.X.X ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 173.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group 173.X.X.X ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 4096&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:0690e432b9864e1fb23dda44cf08e7cd&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also just an FYI the second ASA is in production, we are trying to diagnose speed issues at a different facility so we created ASA 1 to bypass a suspect ASA. So I've been trying to copy the general configurations and that is why you see two peers under the crypto maps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can think of anything please let me know, I greatly appreciate any help!&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2015 21:05:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719909#M191767</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-08T21:05:24Z</dc:date>
    </item>
    <item>
      <title>I'll try to simulate it.Just</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719910#M191769</link>
      <description>&lt;P&gt;I'll try to simulate it.&lt;/P&gt;&lt;P&gt;Just curious, why you have this route in ASA2 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route outside 10.1.1.0 255.255.255.0 173.X.X.X 1&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2015 14:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719910#M191769</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-09T14:43:50Z</dc:date>
    </item>
    <item>
      <title>Thank you so much for all the</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719911#M191770</link>
      <description>&lt;P&gt;Thank you so much for all the help, I truly do appreciate it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That route was something that I tried to use in a last ditch effort to try making things work before coming here and it did not make any difference. I guess I don't fully understand the the flow of logic for route creation/syntax.&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2015 17:16:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719911#M191770</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-09T17:16:55Z</dc:date>
    </item>
    <item>
      <title>I just simulated your config</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719912#M191772</link>
      <description>&lt;P&gt;I just simulated your config in GNS3. It works fine both ways!&lt;/P&gt;&lt;P&gt;Now the only way to troubleshoot it is to debug.&lt;/P&gt;&lt;P&gt;Can you enable debug and logging ?&lt;/P&gt;&lt;P&gt;If you have a very big network then use condition debugging.&lt;/P&gt;&lt;P&gt;Initiate traffic from subnet 192.168.135.0 to 10.1.1.0 and see debug output on ASA2.&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2015 17:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719912#M191772</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-09T17:59:25Z</dc:date>
    </item>
    <item>
      <title>Well it is a relief that it</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719913#M191774</link>
      <description>&lt;P&gt;Well it is a relief that it works in a way, now I just need to figure out how to find the problem. I'm not familiar with debugging at all, would you be able to assist me through the steps? How do I enable debugging and logging? Which ASA would I run this on(I imagine ASA2)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a pretty large network but &amp;nbsp;the connection from ASA2 to ASA1 is a much smaller picture which is why I chose that to work on. Any guidance would be great!&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2015 23:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719913#M191774</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-09T23:45:35Z</dc:date>
    </item>
    <item>
      <title>1. clear crypto ikev1 sa</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719914#M191776</link>
      <description>&lt;P&gt;1.&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;clear crypto ikev1 sa &amp;lt;peer_address&amp;gt; &lt;/EM&gt;&lt;/STRONG&gt;on both ASA.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;clear crypto ipsec sa peer &amp;lt;peer address&amp;gt;&lt;/STRONG&gt;&lt;/EM&gt; on both ASA&lt;/P&gt;&lt;P&gt;3. initiate a ping from&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;subnet 192.168.135.0/24 to 10.1.1.0/24.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;4.&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;show crypto isakmp sa&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;&amp;nbsp;on ASA2 and paste output here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, i am attaching the config i used to simulate this. Please compare with yours and see if there is any difference. I have assumed peer address randomly.&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2015 04:21:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719914#M191776</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-10T04:21:38Z</dc:date>
    </item>
    <item>
      <title>What does the clear crypto</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719915#M191779</link>
      <description>&lt;P&gt;What does the clear crypto ipsec sa peer &amp;lt;peer address&amp;gt; command do, I'm not familiar with SA. I will try this and post back tomorrow when I'm in the office since I need physical access to ASA1 for me to make any changes. I looked through the configuration and it seems to me like everything is the same, I'm just hoping I'm not overlooking some small detail that is throwing everything off.&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2015 14:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719915#M191779</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-10T14:59:30Z</dc:date>
    </item>
    <item>
      <title>its fine if you can do it on</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719916#M191780</link>
      <description>&lt;P&gt;its fine if you can do it on ASA2 only.&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2015 15:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719916#M191780</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-10T15:34:56Z</dc:date>
    </item>
    <item>
      <title>Here are the results from the</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719917#M191781</link>
      <description>&lt;P&gt;Here are the results from the commands above when I run it only on ASA2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PT-Hold-ASA5505# sh crypto isakmp sa&lt;/P&gt;&lt;P&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Active SA: 1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;1 &amp;nbsp; IKE Peer: x.x.x.x&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Type &amp;nbsp; &amp;nbsp;: L2L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Role &amp;nbsp; &amp;nbsp;: responder&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey &amp;nbsp; : no &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;State &amp;nbsp; : MM_ACTIVE&lt;/P&gt;&lt;P&gt;There are no IKEv2 SAs&lt;BR /&gt;PT-Hold-ASA5505#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That peer is the pre-existing connection that is currently working in production.&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2015 17:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719917#M191781</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-10T17:12:42Z</dc:date>
    </item>
    <item>
      <title>I spoke too soon, after I let</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719918#M191782</link>
      <description>&lt;P&gt;I spoke too soon, after I let it sit for a few minutes it now does show the two connections; here is the output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Active SA: 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 2&lt;/P&gt;&lt;P&gt;1 &amp;nbsp; IKE Peer: X.X.X.X&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Type &amp;nbsp; &amp;nbsp;: L2L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Role &amp;nbsp; &amp;nbsp;: responder&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey &amp;nbsp; : no &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;State &amp;nbsp; : MM_ACTIVE&lt;BR /&gt;2 &amp;nbsp; IKE Peer: 173.X.X.X&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Type &amp;nbsp; &amp;nbsp;: L2L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Role &amp;nbsp; &amp;nbsp;: responder&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey &amp;nbsp; : no &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;State &amp;nbsp; : MM_ACTIVE&lt;BR /&gt;PT-Hold-ASA5505#&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2015 17:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719918#M191782</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-10T17:16:40Z</dc:date>
    </item>
    <item>
      <title>Initiate a ping again andshow</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719919#M191783</link>
      <description>&lt;P&gt;Initiate a ping again and&lt;/P&gt;&lt;P&gt;show crypto ipsec sa&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2015 17:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719919#M191783</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-10T17:43:34Z</dc:date>
    </item>
    <item>
      <title>Here is the result of those</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719920#M191784</link>
      <description>&lt;P&gt;Here is the result of those string of commands:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PT-Hold-ASA5505# ping 10.1.1.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;PT-Hold-ASA5505# clear crypto ikev1 sa 173.X.X.X&lt;BR /&gt;PT-Hold-ASA5505# sh crypto isakmp sa&lt;/P&gt;&lt;P&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Active SA: 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 2&lt;/P&gt;&lt;P&gt;1 &amp;nbsp; IKE Peer: X.X.X.X&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Type &amp;nbsp; &amp;nbsp;: L2L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Role &amp;nbsp; &amp;nbsp;: responder&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey &amp;nbsp; : no &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;State &amp;nbsp; : MM_ACTIVE&lt;BR /&gt;2 &amp;nbsp; IKE Peer: 173.X.X.X&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Type &amp;nbsp; &amp;nbsp;: L2L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Role &amp;nbsp; &amp;nbsp;: responder&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey &amp;nbsp; : no &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;State &amp;nbsp; : MM_ACTIVE&lt;/P&gt;&lt;P&gt;There are no IKEv2 SAs&lt;BR /&gt;PT-Hold-ASA5505# ping 10.1.1.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;PT-Hold-ASA5505#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing I did notice is if I ping the outside interface of ASA1&amp;nbsp;the ping is a successes. If I try to ping the inside interface of ASA1 or anything on that internal network it fails.&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2015 20:22:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719920#M191784</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-10T20:22:01Z</dc:date>
    </item>
    <item>
      <title>Can you try to ping from any</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719921#M191785</link>
      <description>&lt;P&gt;Can you try to ping from any other device than ASA2?&lt;/P&gt;&lt;P&gt;I can see that you are pinging from ASA2 itself.&lt;/P&gt;&lt;P&gt;if you have another device behind ASA2 in subnet&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;192.168.135.0/24, initiate a ping from that device to an IP in internal network behind ASA1.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 06:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719921#M191785</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-11T06:33:47Z</dc:date>
    </item>
    <item>
      <title>So I'm in the office today</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719922#M191786</link>
      <description>&lt;P&gt;So I'm in the office today and I went ahead and attempted &amp;nbsp;pinging from behind the ASA2 to a device behind ASA1 and visa versa, I have attached them as images below.&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 13:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719922#M191786</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-11T13:13:35Z</dc:date>
    </item>
    <item>
      <title>Please follow this now: 1.</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719923#M191787</link>
      <description>&lt;P&gt;Please follow this now:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;1.&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;clear crypto ikev1 sa &amp;lt;peer_address&amp;gt;&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;on both ASA.&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;2.&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;clear crypto ipsec sa peer &amp;lt;peer address&amp;gt;&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;on both ASA&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;3. initiate a ping from&amp;nbsp;pc (192.168.135.60) to pc (10.1.1.5). let it complete for 5 requests.&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;4.&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;show crypto isakmp sa&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;&amp;nbsp;on ASA2 and ASA1 and paste output here.&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;5.&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;&lt;EM&gt;show crypto ipsec sa&lt;/EM&gt; &amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;on ASA2 and ASA1 paste output here.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;It'll be gud if you paste output to a txt file and attach.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 13:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719923#M191787</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-11T13:25:06Z</dc:date>
    </item>
    <item>
      <title>Alright I have done this, the</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719924#M191788</link>
      <description>&lt;P&gt;Alright I have done this, the pings still come out the same way, here is the output.&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 13:44:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719924#M191788</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-11T13:44:29Z</dc:date>
    </item>
    <item>
      <title>Looks good from both ASA's .</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719925#M191789</link>
      <description>&lt;P&gt;Looks good from both ASA's . I hope you didn't ping from ASA1 to ASA2 after clearing sa. Do not initiate ping from ASA1 side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;#pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4&lt;BR /&gt;#pkts decaps: 7, #pkts decrypt: 7, #pkts verify: 7&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Just to make sure, please repeat steps 1 &amp;amp; 2 above and&amp;nbsp;ping again from&amp;nbsp;pc (192.168.135.60) to pc (10.1.1.5). let it complete for &lt;STRONG&gt;exactly 10&lt;/STRONG&gt; requests.&lt;/P&gt;&lt;P&gt;repeat steps 4 and 5 above.&lt;/P&gt;&lt;P&gt;Also please check if pc (10.1.1.5). has local firewall blocking the ping.&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 13:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719925#M191789</guid>
      <dc:creator>ROHIT SHARMA</dc:creator>
      <dc:date>2015-05-11T13:53:34Z</dc:date>
    </item>
    <item>
      <title>Okay I did as you said, no</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719926#M191790</link>
      <description>&lt;P&gt;Okay I did as you said, no pings from ASA1 or anything behind ASA1. After clearing both ASA's of ikev1 and ipsec I went on the 10.1.1.5 PC and initiated ping 192.168.135.60 -n 10. Here are the results of the show after that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm completely at a loss, I hope something makes sense to you! Also I have disabled all firewalls on the 10.1.1.5 Pc.&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 14:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-ipsec-l2l-vpn-1-way-communication/m-p/2719926#M191790</guid>
      <dc:creator>RobertJLake</dc:creator>
      <dc:date>2015-05-11T14:27:19Z</dc:date>
    </item>
  </channel>
</rss>

