If the VPN is up, that means that Crypto Access-List is ok, and shouldn't have any problems. However I would insist you to check with Extended Ping Utility as whenever you use the normal Ping, the External Interface's IP Address is used as source and it never ends up using the IPSec Connection.
Alternatively, please try the tracert from a PC and you might get better clues.
If you are using any open technology like IPSec it shouldn't be any problem across any platform, however as a word of pre-caution you must cross check that everything is exactly as a mirror replica of each other.
Since on both the sites there are two different products, I shall request you to take a copy of both the configs and tally it mannually and you would come across any issues.
It looks like both setups are doing the same thing.
The tunnel is actually up and working on the PIX (probably was up and working on the Netscreen also),
From the PIX end to the 2800 series router I can ping the router interface, I don't have anything connected to the inside interface so I have only tried to ping the router interface from the PIX end and it works.
From the 2800 router end, I can not ping the PIX inside interface, but I can ping a workstation on the network the inside interface sits on(PIX is 10.10.10.1/24, workstation is 10.10.10.5/24).
On the Netscreen, it looks like it was doing the same thing as far as the inside interface goes, I didn't try anything beyond that, but the tunnel was up, but I could not ping the Netscreen interface.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :