! ! ! crypto map mycryptomap 10 ipsec-isakmp set peer XX.XX.XX.XX set transform-set mytransformset match address 101
! interface Dialer1 ip address negotiated ip mtu 1492 ip nat outside ip virtual-reassembly encapsulation ppp dialer pool 1 ppp authentication pap callin ppp pap sent-username username password 7 DSE456CK8750KK crypto map mycryptomap !
! ip route 0.0.0.0 0.0.0.0 Dialer1
ip nat pool mypool YY.YY.YY.YY YY.YY.YY.YY netmask 255.255.255.0 ip nat inside source list 120 interface Dialer1 overload ip nat inside source route-map nonat pool mypool overload ! access-list 100 permit ip 0.0.0.0 255.255.255.0 any access-list 101 permit ip 10.2.2.0 0.0.0.255 126.96.36.199 0.255.255.255 log access-list 120 permit ip 10.2.2.0 0.0.0.255 any access-list 130 permit ip 10.2.2.0 0.0.0.255 192.0.0.0 0.255.255.255 access-list 130 permit ip 192.0.0.0 0.255.255.255 10.2.2.0 0.0.0.255
! ! route-map nonat permit 10 match ip address 130 !
but unfortunatly the tunnel is not getting established with the ASA 5520.
Re: Site to Site VPN using ASA5520 and cisco 887 ADSL router (at
I tried an extended ping from my 887 router
to my LAN ip in main office
The below output i am getting :
ADSL_RTR#show crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id status 77.69.xxx.130 89.xxx.43.88 MM_NO_STATE 2004 ACTIVE (deleted) 77.69.xxx.130 89.xxx.43.88 MM_NO_STATE 2003 ACTIVE (deleted)
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...