setting up a Site-To-Site VPN using two Cisco ASA 5505 devices
i just bought 2 Cisco ASA 5505 devices each located on a different building. the two outside vlan's are connected to a T1 connection and the inside vlan's have their own local network.
i have setup the VPN tunnel but i am still not able to ping across from one local network to the other.
is there something i am missing on the setup?
Result of the first device "Jarrowcisco":: Saved: Written by enable_15 at 14:03:10.324 UTC Tue Jul 22 2008!ASA Version 7.2(4) !hostname jarrowciscodomain-name domain.comenable password 8Ry2YjIyt7RRXU24 encryptedpasswd 2KFQnbNIdI.2KYOU encryptednames!interface Vlan1 nameif inside security-level 100 ip address 192.168.2.254 255.255.255.0 !interface Vlan2 nameif outside security-level 0 ip address 64.x.x.67 255.255.255.248 !interface Ethernet0/0 switchport access vlan 2!interface Ethernet0/1!interface Ethernet0/2!interface Ethernet0/3!interface Ethernet0/4!interface Ethernet0/5!interface Ethernet0/6!interface Ethernet0/7!ftp mode passivedns server-group DefaultDNS domain-name doamin.comaccess-list outside_1_cryptomap extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list inside_nat0_outbound extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list outside_access_in remark to hayden insideaccess-list outside_access_in extended permit ip any any access-list inside_access_in extended permit ip any any pager lines 24logging enablelogging asdm informationalmtu inside 1500mtu outside 1500icmp unreachable rate-limit 1 burst-size 1asdm image disk0:/asdm-524.binasdm location 192.168.1.0 255.255.255.0 insideno asdm history enablearp timeout 14400global (outside) 1 interfacenat (inside) 0 access-list inside_nat0_outboundnat (inside) 1 0.0.0.0 0.0.0.0access-group inside_access_in in interface insideaccess-group outside_access_in in interface outsideroute outside 0.0.0.0 0.0.0.0 64.x.x.65 1timeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolutehttp server enablehttp 192.168.2.0 255.255.255.0 insideno snmp-server locationno snmp-server contactsnmp-server enable traps snmp authentication linkup linkdown coldstartcrypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto map outside_map 1 match address outside_1_cryptomapcrypto map outside_map 1 set pfs group1crypto map outside_map 1 set peer 74.0.88.253 crypto map outside_map 1 set transform-set ESP-3DES-SHAcrypto map outside_map interface outsidecrypto isakmp enable outsidecrypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400telnet timeout 5ssh timeout 5console timeout 0dhcpd auto_config outside!username enable nopassword privilege 15tunnel-group 74.x.x.253 type ipsec-l2ltunnel-group 74.x.x.253 ipsec-attributes pre-shared-key *!class-map inspection_default match default-inspection-traffic!!policy-map type inspect dns preset_dns_map parameters message-length maximum 512policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp !service-policy global_policy globalprompt hostname context Cryptochecksum:d0b52d6b4364b60f98b90549a6b22d9bResult of the second device "Haydencisco": Saved: Written by enable_15 at 14:03:08.606 UTC Tue Jul 22 2008!ASA Version 7.2(4) !hostname haydenciscodomain-name domain.comenable password 8Ry2YjIyt7RRXU24 encryptedpasswd 2KFQnbNIdI.2KYOU encryptednames!interface Vlan1 nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0 !interface Vlan2 nameif outside security-level 0 ip address 74.x.x.253 255.255.255.248 !interface Ethernet0/0 switchport access vlan 2!interface Ethernet0/1!interface Ethernet0/2!interface Ethernet0/3!interface Ethernet0/4!interface Ethernet0/5!interface Ethernet0/6!interface Ethernet0/7!ftp mode passivedns server-group DefaultDNS domain-name domain.comaccess-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 access-list outside_access_in extended permit ip any any access-list inside_access_in extended permit ip any any pager lines 24logging enablelogging asdm informationalmtu inside 1500mtu outside 1500icmp unreachable rate-limit 1 burst-size 1asdm image disk0:/asdm-524.binasdm location 192.168.2.0 255.255.255.0 insideno asdm history enablearp timeout 14400global (outside) 1 interfacenat (inside) 0 access-list inside_nat0_outboundnat (inside) 1 0.0.0.0 0.0.0.0access-group inside_access_in in interface insideaccess-group outside_access_in in interface outsideroute outside 0.0.0.0 0.0.0.0 74.0.88.249 1timeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolutehttp server enablehttp 192.168.1.0 255.255.255.0 insideno snmp-server locationno snmp-server contactsnmp-server enable traps snmp authentication linkup linkdown coldstartcrypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto map outside_map 1 match address outside_1_cryptomapcrypto map outside_map 1 set pfs group1crypto map outside_map 1 set peer 64.x.x.67 crypto map outside_map 1 set transform-set ESP-3DES-SHAcrypto map outside_map interface outsidecrypto isakmp enable outsidecrypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400telnet timeout 5ssh timeout 5console timeout 0dhcpd auto_config outside!dhcpd address 192.168.1.100-192.168.1.200 insidedhcpd enable inside!username enable nopassword privilege 15tunnel-group 64.x.x.67 type ipsec-l2ltunnel-group 64.x.x.67 ipsec-attributes pre-shared-key *!class-map inspection_default match default-inspection-traffic!!policy-map type inspect dns preset_dns_map parameters message-length maximum 512policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp !service-policy global_policy globalprompt hostname context Cryptochecksum:5369eddde8112300cdf9420491fc6eb3