sa not activated on ASA5505 after completion of L2L VPN
hello I am setting up a new VPN connection and when I follow all the procress of adding a new L2L (Site2Site) VPN connection, it is not activating... this is what I have done I am having issue with my CISCO ASA 5505, not activating L2L VPN connections after I did the configuration. I did the Phase 1 and Phase 2 and at the end of the configuration the "sh isakmp sa" is not showing it activated. I have existing VPN activated but the added ones is not getting activated.
Attached you will find our License information and VPN Peer activate list.
I have 6 VPN configured, and just 3 is showing. I am not able to troubleshoot if it is not even showing as being enable.
Please let me know what you think can be the issue.
PS: This is what I did: crypto isakmp policy 70 encryption 3des authentication pre-share group 2 lifetime 28800 hash md5 exit
I encounter problems recently setting up my ASA5505. I tried to create a new VPN (Site-to-Site), despite that the procedure was followed correctly, the command "sh crypto isakmp sa" does not display the new VPN profile. But I have other VPN (sa) that appears well, but the new ones do not appear. In order to create new ties for VPN services, I decided to acquire a new ASA5505 connects to the same server (both ASA are connected on the same server "Host"). But since I installed and configured the new ASA5505, my former ASA went down and now showing no active profile (asa# sh cry ips sa peer 220.127.116.11 There are no ipsec sas). ASA # show crypto isakmp its There are no IKEv1 SAs There are no IKEv2
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :