I have recently started working for a client who has 2 ASA 5505 with version 6.0(2) running on them. At some point after firing his last tech his VPN no longer works, I don't know the story except it doesn't work anymore.
At his office the ASA has a public IP address so it isn't behind a NAT device. The office network behind the device is 192.168.0.0 At home he has a residential cable modem with a dynamic IP and the device is behind the device and having NAT applied to it. So it's WAN IP is 10.0.0.3 and it has a couple VLANs behind it (192.168.1.0 and 192.168.5.0) Running packet-tracer it makes it through all 9 phases with ICMP and TCP. I can see in the office log that Phase 1 is completed. I do not see anyything being logged as to blocking traffic. I can see that it is encapsulating packets at the home side, but it appears nothing is reaching the office side. Most of the tutorials and help I see are using the newer ASA so the commands don't always work. I also see a map titled 'abcmap' but it does not show up in the ASDM anywhere, I only see it while at the command line which is making me wonder if there are some additional things that are causing a problem that I am not able to see.
When I was attempting to do this with a dynamic IP on the home side no connection was forming at all. Was hoping if I got it working with their current IP I would then be able to set it up again with dynamic or alter the configuration.
Thanks for looking. Sorry if I wasn't clear, at first I was getting nowhere with the dynamic setting so I redid it using their current iP, 188.8.131.52, as I've seen references to remove the static and convert it into a dynamic setup afterwards. I might be wrong in that thought though.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :