I've been working to replace our 806 router by a 831. I took the configuration from the 806 without modifying it and copied it in the 831. This router is configured to connect to 3 peers, 2 of which use isakmp, and 1 use manual ipsec, due to the peer being a sonicwall.
The manual IPSEC tunnel seems to be up, data is encrypted, but no reply is received.
If I put back the configuration in the 806, and put it online, all 3 tunnels goes back up and connectivity is reached via all 3 of them.
Since the 831 is a new router using hardware encryption, there is only 2 versions available for this router. Both uses one of the latest 12.2 ED IOS.
For the sonicwall, I don't have access to this router since it's owned by another company. But I know that they have multiple VPN up in a hub and spoke configuration, having the sonicwall as a HUB.
When I put the 831 in place, I used another configuration that is similar to the other peers. Nothing was reachable. I took this config and put it in the 806, and everything worked. So if I needed to clear the SA on the sonicwall, the 831 would have worked and the 806 may have not.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :