//www.meetup.com/cisco-Networkers/ Another video on how to setup site to site VPN tunnel between two Cisco ASA. In this example I am using two 5505s ...
Hi Team,
Great video, quick question regarding the ACL portion through. Besides the
interesting traffic ACL which we tie to the crypto maps. Did we also have
an ACL pointing to the remote subnet and tied thay to the access-group
command?
For example
access-list lan-lan2 extended permit 192.168.10.0 255.255.255.0
192.168.20.10 255.255.255.0
access-group lan-lan2 out interface inside
I'm creating a site2site vpn via packet tracer 6.1 and see that the
lan-lan2 is part of that config. Just want to confirm my steps are correct,
can you please reply and confirm? I'm signing up for your group by the way,
regards.
How many concurrent VPN tunnels can you connect to a ASA 5505? I am
thinking of hooking 4 remote offices with a ASA 5505 to a central office
that has a ASA5505. Thanks.
You say that if you don't see a translated address on the show nat, it
might be a problem with an access-list. Nat translation occur first and
then it use the access-list to tell what traffic is allow on the IPSec
tunnel. If you don't see a hit on NAT translation, it might a problem with
having the wrong object group or the address is being translated by other
Nat statement. I just want to let you know that because I used to think
that access-list happened before Nat, but it is backward. Thanks for your
video.
Hi Sean, nice tutorial you got here. I have a question: in the 2nd phase,
IPSEC, I need to input additional params like: Ipsec Data Encryption
AES-256, Data Integrity SHA-1, Use PFS Yes, Diffie-Hellman Group
2,Renegotiate IPSec SA time 3600 seconds. Could you share any bit of advice
here? I'm new to CISCO configuring here. Thank you for your time here.
i follow what you are doing...my question is where did you learn the
code...is there a website that you can point me to that i can
reference...i'm working on pretty much the exact same thing for a project
in class
@TudorAdrian This is a higher level of Cisco learning. I would suggest that
you drill all of the earlier levels until you know them well before you
tackle VPN's
Cisco ASA 5505 Firewall vpn tunnel creation Final Part
This is part 3 in a series of videos on Cisco 5505. This is the final part and in here i show you how to create VPN tunnles on your end or atleast preposition vpn ...
HI, i been having an issue with me cisco router 891W and asa5505. the
router which is connected to the asa5505 int fe0/1 can go out to the
internet and no problem. bbut when i try to ping from asa to my router all
the packets fail.. email me if you like to help i can also send you the
config files to have a better veiw of the network please.
[email protected] Thank You
Hey man, your videos are great. I don't like the cbt nuggets because the
guy talks like the micromachines dude from the 80's. You teach more at my
speed. Thanks.
This video worked for me, but you should add a section for access lists for
people that already have NAT set up. If you don't set the right access list
settings, all traffic will still go to the WAN instead of the VPN. Example:
access-list 100 deny ip 172.16.20.0 0.0.0.255 172.16.30.0 0.0.0.255
Firstly I congratulate you for your presentation please, are you declare
the Fast Ethernet interfaces in the routing protocol? because I tried the
same configuration except that the ping gives me U.U.U (ip route 0.0.0.0
0.0.0.0 interface (output) please i need your help here is my email
[email protected]
@bahnasse I had same problem with GNS3, try to ping in the alternative mode
with extended command: ping > enter than define every parameter (repeat
count, time out ...) in particular, define "source address or interface"
Hi. thanks for the video, really helpful.
can we apply this cryptography key to a tunnel interface? ie. an ipsec
tunnel i have created from one site router to the other.