Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I have a L2L VPN between two ASA5510. The tunnel is up and passing traffic between 14 network pairs but two. I have checked that the interesting traffic is in the no nat ACL, in the crypto map ACL and in the interfaces permitted ACL in both sites. I...
I have configured the policy-map on the interface inside of my ASA with conform action "transmit" and exceed action "drop". But when I execute the command "sh service-policy interface inside", I obtain the following:Input police Interface inside: cir...
I have exempt nat. Yes, they are, 10.10.1.0 & 10.10.19.0 are in the crypto map. If they weren't, they wouldn't appear in the "show crypto ipsec sa X.X.X.X" output. I don't have routes since network gateways are configured in the ASAs.
I ping from site 2 to site 1, and those are the results from the ASDM debugging tool for the networks with problem:Site 1:6Jun 16 201114:50:0030202010.10.3.251210.10.19.380Built inbound ICMP connection for faddr 10.10.3.2/512 gaddr 10.10.19.38/0 ladd...
Thank you for your response. Following the configuration and the show command output.sh runn:!access-list LAN-SERVER-FLOW extended permit tcp 192.168.1.0 255.255.255.0 host 192.168.2.2 eq exec access-list LAN-OTHERS-FLOW extended permit ip 192.168.1....