Hi,
I'm trying to setup a site to site vpn between to ASA 5505's. For some reason I just can't get it to work properly.
I've got two sites, A and B:
A: 10.1.20.0 Cisco ASA 5505 with FW 7.2
A1: Test pc on this network: 10.1.20.189
B: 10.1.2.0, Cisco ASA 5505 with FW 8.3
B1: 10.1.2.101 Test pc on remote network that should respond to ping.
The tunnel is up and from Site A I can ping the ASA on Site B. ie. I can ping 10.1.2.1 from any computer on 10.1.20.0. However, when I try pining any of the machines behind the Site B FW, it just won't work.
i.e, trying to ping 10.1.2.101 from 10.1.20.138 doesn't work, but ping 10.1.2.1 from 10.1.20.138 works fine. Same problem the other direction, but from Site B I can't even ping the gateway of Site A so I assume the problem actually is on Site B ASA.
Running config for Site A:
asdm image disk0:/asdm-521.binno asdm history enable: Saved:ASA Version 7.2(1) !hostname ciscoasadomain-name default.domain.invalidenable password nvNvdhePuUkZsFOo encryptednames!interface Vlan1 nameif inside security-level 100 ip address 10.1.20.1 255.255.255.0 ospf cost 10!interface Vlan2 nameif outside security-level 0 ip address dhcp setroute ospf cost 10!interface Ethernet0/0 switchport access vlan 2 no nameif no security-level no ip address!interface Ethernet0/1 no nameif no security-level no ip address!interface Ethernet0/2 no nameif no security-level no ip address!interface Ethernet0/3 no nameif no security-level no ip address!interface Ethernet0/4 no nameif no security-level no ip address!interface Ethernet0/5 no nameif no security-level no ip address!interface Ethernet0/6 no nameif no security-level no ip address!interface Ethernet0/7 no nameif no security-level no ip address!passwd XXXXXXXXXXX.XXXXX encryptedftp mode passivedns server-group DefaultDNS domain-name default.domain.invalidsame-security-traffic permit intra-interfaceaccess-list outside_20_cryptomap extended permit ip 10.1.20.0 255.255.255.0 10.1.2.0 255.255.255.0 access-list inside_nat0_outbound extended permit ip 10.1.20.0 255.255.255.0 10.1.2.0 255.255.255.0 access-list inside_access_out extended permit ip any 10.1.2.0 255.255.255.0 pager lines 24logging enablelogging asdm warningsmtu inside 1500mtu outside 1500asdm image disk0:/asdm-521.binno asdm history enablearp timeout 14400global (outside) 1 interfacenat (inside) 0 access-list inside_nat0_outboundnat (inside) 1 0.0.0.0 0.0.0.0access-group inside_access_out out interface insideroute outside 0.0.0.0 0.0.0.0 91.XXX.X.1 1timeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout uauth 0:05:00 absolutehttp server enablehttp 10.1.20.0 255.255.255.0 insidehttp 195.XXX.2X3.XXX 255.255.255.255 outsideno snmp-server locationno snmp-server contactsnmp-server enable traps snmp authentication linkup linkdown coldstartcrypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto map outside_map 20 match address outside_20_cryptomapcrypto map outside_map 20 set peer 195.XXX.2X3.XXX crypto map outside_map 20 set transform-set ESP-3DES-SHAcrypto map outside_map interface outsidecrypto isakmp enable insidecrypto isakmp enable outsidecrypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400tunnel-group 195.XXX.2X3.XXX type ipsec-l2ltunnel-group 195.XXX.2X3.XXX ipsec-attributes pre-shared-key *tunnel-group-map default-group 195.XXX.2X3.XXXtelnet timeout 5ssh timeout 5console timeout 0dhcpd auto_config outside!dhcpd address 10.1.20.100-10.1.20.200 insidedhcpd auto_config outside interface insidedhcpd enable inside!!class-map inspection_default match default-inspection-traffic!!policy-map type inspect dns preset_dns_map parameters message-length maximum 512policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp !service-policy global_policy globalprompt hostname context Cryptochecksum:55a5c1ae520add67614599545544e45a: end
I would guess that it's related to routing but I have tried different ways there as well and I'm just nog getting anywhere....
My hopes are now that someone more experienced on Cisco than I can help me out with this one. :-)
/Tomas
Hardware FirewallsInternet Protocol SecurityCisco
Last Comment
Pete Long
8/22/2022 - Mon
tnson
ASKER
Increasing points since I'm in a bit of a hurry. :)
Figured it out my self... it was the ICMP setting in the ASA with later FW. In the old one this was enabled already, but from FW 8.x you have to enable it.
Figured it out my self... it was the ICMP setting in the ASA with later FW. In the old one this was enabled already, but from FW 8.x you have to enable it.