10-26-2016 09:51 AM
I am trying to connect a small office (5 people) to our main office using a Cisco RV220W to our ASA 55120-X. I can get the VPN connected without issue but I cannot ping any of our internal VLANs. The network at the main office is our ASA then a 3850 Router configured for router on a stick with 5 VLANs. I have tried configuring the VPN to connect to both the 192.168.80.0 network the remote site needs access to as well as the network for the inside interface. Neither configuration allows me to access the resources I need to.
10-26-2016 11:46 AM
Hi Ty Melrose,
Can you share the tunnel and nat configuration?
If the tunnel is up can you see phase 1 and 2 up? show crypto isa sa / sh cry ipsec sa
This guide explains step by step the config between an ASA and a RV:
http://sbkb.cisco.com/CiscoSB/GetArticle.aspx?docid=7200e3b590e443af8f27a1ca957705ba_Configuring_a_Site_to_Site_VPN_tunnel_between_RV_Series_Rout.xml
Hope this info helps!!
Rate if helps you!!
-JP-
10-26-2016 01:46 PM
We have a few remote access users that are in the mix so if I miss something, please let me know.
8 IKE Peer: <Remote Site IP>
Type : L2L Role : responder
Rekey : no State : MM_ACTIVE
10-26-2016 05:59 PM
Seems like ph1 and ph2 as you told us before, now i don't see any encaps or decaps which means there is no traffic passing through the tunnel, can you share your nat configuration on the ASA? Are you initiating the traffic behind of the ASA or behind the RV?
You can also share a packet tracer like the following:
packet-tracer input inside icmp 192.168.80.10 8 0 192.168.100.10 detail
After running that command you can also share a show crypto ipsec sa.
Hope this info helps!!
Rate if helps you!!
-JP-
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide