Hi ,
This is our scenario :
Poly com Video equipment ----------> firewall -------------> Cisco router ------------> ISP .
Poly com video equipment ( 10.10.10.10 ) is static nat with cisco router 1941 (110.110.X.X ) .
In firewall not configured ...
Hi ,
This is our scenario :
Poly com Video equipment ----------> firewall -------------> Cisco router ------------> ISP .
Poly com video equipment ( 10.10.10.10 ) is static nat with cisco router 1941 (110.110.X.X ) .
In firewall not configured ...
i 've configured active standby using cisco asa 5525 . The primary firewall was some hardware issue so the secondary firewall became active mode ,all working fine .The probelm is when the secondary firewall is an active mode , asdm is not working bu...
Dear All ,
We have a cisco asa 5525 firewall which is connected three internal network and one outside networks.
DMZ sec value 90 , inside sec value 80 , Client sec value 70 & outise value 0 .
We need to monitor the outside interface what ...
Dear All ,
We have a cisco asa 5525 firewall which is connected three internal network and one outside networks.
DMZ sec value 90 , inside sec value 80 , Client sec value 70 & outise value 0 .
We need to monitor the outside interface what ...
i recommend you to debug the ASA5512 .
Initiate continuous ping from 10.2.0.2 to 10.1.0.2
# loggin on
#loggin con 7
#debug crypto ipsec 127
& also # debug icmp trace
for more please share the both configuration ASA.
Regards,
Mani
01. try to initiate the traffic from your side & to check # show crypto isakmp sa
02. either as do debug the command at ASA #debug crypto ikev1/ikev2 127
share the logs.
In tunnel group only you are pointing as site to site VPN is going to configure on firewall .
For eg : #tunnel-group XYZ type ipsec-l2l
for Remote access VPN "remote-access"
for site to site VPN " ipsec-l2l"
If this helps you Please rate me .