Hi All, I recently purchased a new ASA5505 and have been having trouble creating a site to site VPN to another location/device. I've used the VPN Site to Site wizard to configure the VPN but after the wizard completes how does one verify VPN connectivity via ASDM? Also, I've run debug crypto IPSec and isakmp and see absolutely nothing? So how does one verify that the VPN is up and if it is not, how does one troubleshoot why it is not? The other side is configured and I had no trouble getting this same VPN working on an old Watchguard device. ~Thanks
Hi rizwanr74, all the sh crypto commands returned nothing? Here is my current config (public IP's have been x'd out for privacy). Let me know if you need more information. btw, I can ping 220.127.116.11 and the vpn peer address from the ASA.
ASDM doesn't allow you to automatically initiate a VPN tunnel - the ASA has to see interesting traffic and decide to encrypt it. This is different then many vendors that will just automatically initiate a tunnel (like watchguard).
Try the following from the command line on the ASA
ping inside 10.10.0.1
This should, in theory, initiate the VPN tunnel from the ASA. The other thing you can try is from a host on the inside network, ping anything on the 10.10.0.x network (making sure that network is routed to the ASA) - and that should initiate the tunnel as well.
At that point, it should initiate the VPN tunnel - and if you match the other side it should come up. Make sure you have 'debug crypto isakmp 8' on and if you see debugs you know the tunnel is at least initiating.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...