03-05-2012 07:41 PM
I have two ASA 5505 running 8.4 and I tried using the VPN wizard and using the CLI but i am not able to get the peers to initialze. I have looked at other configs and am not seeing what is missing. I have tried packet tracking through the ASDM and its not even seeing the VPN tunnel and keeps trying to go out to the internet. I have attached both configs for assistance.
Solved! Go to Solution.
03-11-2012 06:40 PM
I am glad that you figured out the problem and got the tunnel to initialize. Thanks for posting back to the forum and indicating what you found to be the problem and how you fixed it. This is a good reminder of the importance of making sure that the crypto map matches on both ends. Perhaps now you can mark this issue as solved and this would let other readers know that there is a solution to the problem here.
HTH
Rick
03-06-2012 05:22 AM
hello,
i think you must change the vpn-tunnel-protocol to IPSec.
"
...
group-policy GroupPolicy_X.X.X.X attributes
vpn-tunnel-protocol IPSec
...
"
Do you have any Error message in Syslog?
03-06-2012 06:14 AM
vpn-tunnel-protocol ikev1 is for IPSEC v1 and there is a v2 as well. I am just trying to get phase one to connect and not able to do that. Through the packet tracer on the ASDM i am not even seeing the packet try to go through the VPN tunnel at all, just trying to go over the internet access-list.
03-06-2012 11:29 AM
Hello,
Please change the nat statements and just put them back again without the route-lookup or the no-proxy-arp
03-09-2012 12:22 PM
This issue i found was with the crypto map. one side was setup using IP and subnet and the other side was using OBJ and they was not seeing each other. Once i changed both sides to match with IP and subnet the vpn tunnel came back up and it is working.
03-11-2012 06:40 PM
I am glad that you figured out the problem and got the tunnel to initialize. Thanks for posting back to the forum and indicating what you found to be the problem and how you fixed it. This is a good reminder of the importance of making sure that the crypto map matches on both ends. Perhaps now you can mark this issue as solved and this would let other readers know that there is a solution to the problem here.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide