11-02-2006 07:13 PM - edited 02-21-2020 02:42 PM
I'm running an ASA 7.2.1 and a PIX 6.3.5. I've posted my config for the ASA, as it's what's causing me grief. I can extablish the tunnel for an IPSEC VPN on both ends (i just used the vpn wizard on both devices). My devices on the pix end (192.168.1.0) able to gain access to the devices on the ASA end (10.184.0.0) however, when the 10.184.0.0 end tries to reply with packets, the ASA denies it giving a 2 Nov 02 2006 20:45:42 106006 10.184.196.64 192.168.1.20 Deny inbound UDP from 10.184.196.64/64039 to 192.168.1.20/49182 on interface connect. This is less than favorable. It occurs with ICMP, UDP and TCP traffic. Any help on letting these two LAN's chat would be much appreciated.
config for ASA attached:
11-08-2006 12:50 PM
Try this:
Check the ACL for Interesting Traffic and NAT 0 configuration in ASA end.
Also ensure "sysopt connection permit-ipsec" command is enabled.
Try these links:
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080702992.shtml
11-08-2006 03:08 PM
My failover network and remote lan were the same subnet on the ASA. Changed the subnet over on the failover and all worked well. Thanks for your help
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide