<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa5505 ipsec tunnel problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795733#M976539</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may remove the following line as it is not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list outside_20_cryptomap extended permit icmp 192.168.52.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mattiaseriksson said you need to add nat exemption. One comment to his statement is you should not reuse the crypto acl for your nat exemption. It is always good practice to create a separate acl. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat0 extended permit ip 192.168.52.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat0 extended permit ip 192.168.1.0 255.255.255.0 192.168.52.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Jul 2007 11:41:18 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-07-16T11:41:18Z</dc:date>
    <item>
      <title>asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795725#M976531</link>
      <description>&lt;P&gt;I have 2 asa5505. I want to create ipsec tunnel. Do as write this &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/getting_started/asa5500/quick/guide/sitvpn_b.html#wp1038592" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/getting_started/asa5500/quick/guide/sitvpn_b.html#wp1038592&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But tunnel does not establish&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show crypto isakmp sa&lt;/P&gt;&lt;P&gt;There are no isakmp sas&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show crypto ipsec sa&lt;/P&gt;&lt;P&gt;There are no ipsec sas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First ASA config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.52.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 209.x.x.236 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list outside_20_cryptomap extended permit ip 192.168.52.0 255.255.255.0 host 209.x.x.226&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging debug-trace&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.52.240 1&lt;/P&gt;&lt;P&gt;route outside 192.168.1.0 255.255.255.0 209.168.200.226 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_20_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set pfs&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer 209.165.200.226&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group 209.x.x.226 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 209.x.x.226 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;telnet timeout 1440&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795725#M976531</guid>
      <dc:creator>oshechodanov</dc:creator>
      <dc:date>2019-03-11T10:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795726#M976532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;secon asa config&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 209.165.200.226 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list outside_20_cryptomap extended permit ip 192.168.1.0 255.255.255.0 host 209.165.200.236 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 192.168.52.0 255.255.255.0 209.168.200.236 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_20_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer 209.165.200.236 &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group 209.165.200.236 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 209.165.200.236 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:56cb3d2d69c8d5ea880bb964ffa21899&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 04:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795726#M976532</guid>
      <dc:creator>oshechodanov</dc:creator>
      <dc:date>2007-07-16T04:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795727#M976533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, the access-lists you call outside_20_cryptomap is used to identify the packets that the IPSec connection permits and protects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both firewalls crypto maps must contain compatible crypto ACLs, which usually means that they have to be mirrored.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case they should look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall 1:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_20_cryptomap extended permit ip 192.168.52.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall 2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_20_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.52.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 07:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795727#M976533</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-16T07:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795728#M976534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And in ASDM VPN wizard you refer to, the error was on the 'Hosts And Networks' page. There you should input the 192.168.52.0 as the local (source) network and 192.168.1.0 as remote (destination) network in firewall 1. In firewall 2 the networks should be reversed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also did not check the option to Exempt ASA side network from NAT. You need to do that on both sides as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 08:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795728#M976534</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-16T08:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795729#M976535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do this, but tunnel does not work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 09:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795729#M976535</guid>
      <dc:creator>oshechodanov</dc:creator>
      <dc:date>2007-07-16T09:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795730#M976536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you attach the updated configurations for us to look at?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 09:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795730#M976536</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-16T09:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795731#M976537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here new configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 09:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795731#M976537</guid>
      <dc:creator>oshechodanov</dc:creator>
      <dc:date>2007-07-16T09:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795732#M976538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume that you do not want to NAT the traffic between the sites, so you need to add this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list outside_20_cryptomap to both sides.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 10:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795732#M976538</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-16T10:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795733#M976539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may remove the following line as it is not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list outside_20_cryptomap extended permit icmp 192.168.52.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mattiaseriksson said you need to add nat exemption. One comment to his statement is you should not reuse the crypto acl for your nat exemption. It is always good practice to create a separate acl. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat0 extended permit ip 192.168.52.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat0 extended permit ip 192.168.1.0 255.255.255.0 192.168.52.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 11:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795733#M976539</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-16T11:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795734#M976540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do all of advices. But tunnel does not work.&lt;/P&gt;&lt;P&gt;I dont understant why. Anybody has any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help please!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 02:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795734#M976540</guid>
      <dc:creator>oshechodanov</dc:creator>
      <dc:date>2007-07-17T02:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 ipsec tunnel problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795735#M976541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all. Problem solved&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 06:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-ipsec-tunnel-problem/m-p/795735#M976541</guid>
      <dc:creator>oshechodanov</dc:creator>
      <dc:date>2007-07-17T06:34:40Z</dc:date>
    </item>
  </channel>
</rss>

