CISCO 5510 - ASA SSL / IPSEC VPN EDITION GETTING STARTED

I'm trying to establish a site-to-site VPN between an ASA 5505 & ASA 5510. The config I received from the remote peer is (ASA 5510): LAN IP : 192.168.2.0 255.255.255.0 Outside IP : 2.2.2.2 transform-set : esp-3des esp-sha-hmac isakmp policy 10 authentication pre-share If you are running an ASA older than version 8.3(x) you will need to create a second access list to STOP the ASA performing NAT on the traffic that travels over the VPN. Warning: (ASA Version 8.3 or older): If you already have NAT excluded traffic on the firewall (for other VPN’s) this will BREAK THEM – to see if you do, issue a “show run The first site (Remote1) is equipped with a Cisco ASA firewall (any model) and the second site (Remote2) is equipped with a Cisco Router. Remember that a Cisco ASA firewall is by default capable to support IPSEC VPN but a Cisco Router must have the proper IOS software type in order to support encrypted VPN tunnels. Hi, still having problems getting this site to site vpn established between a Cisco ASA 5510 and a Sonicwall. Here is all the info: Config: ASA Version 8.0(3) ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted names! interface Ethernet0/0 nameif inside security-level 100 ip address 192.168.30.3 255.255.255.0 ! interface Ethernet0/1 Is it possible to do split tunnelling with a site to site VPN connection using Cisco ASAs? We have a Cisco ASA 5510 at head office, and Cisco 5505 in our branch office, currently connected via a Site-To-Site VPN. I'd like to give direct access to the internet for hosts in the branch office. Is it possible. I just set up a site to site VPN between an ASA 5510 and a Meraki MX64. The site are connected and up but cant communicate across them. Im sure its a routing issue. Here is an image of my setup. I cant ping anything on the inside of either. Here is what I have for routing

Site-to-Site VPN w/ Remote User VPN I have a USG with a currently running IPSec site-to-site VPN configured to a Cisco ASA 5510. The LAN connected computers can access this VPN just fine, but I also want the VPN users to be able to access these devices at the remote end of the VPN.

Nov 06, 2013 Site-to-Site VPN ASA 5505 to ASA 5510 Solutions | Experts

Mar 28, 2013

Feb 20, 2008 EdgeRouter - Site-to-Site IPsec VPN to Cisco ASA set vpn ipsec site-to-site peer 192.0.2.1 description ipsec set vpn ipsec site-to-site peer 192.0.2.1 local-address 203.0.113.1. 6. Link the SAs created above to the remote peer and define the local and remote subnets. set vpn ipsec site-to-site peer 192.0.2.1 ike-group FOO0 set vpn ipsec site-to-site peer 192.0.2.1 tunnel 1 esp-group FOO0 Internet access through VPN on ASA 5510? - TechRepublic The ASA installs a static route whenever a VPN client is connected. The route looks something like this: 10.100.0.1 255.255.255.255 via [ISP's gateway IP], outside. 0 Votes cisco asa - Site-to-Site VPN Tunnel Up Not Passing Traffic I have a site-to-site VPN that seems to be dropping traffic from a particular subnet when a lot of data is being pushed through the tunnel. I have to run clear ipsec sa to get it going again.. I notice the following when running show crypto ipsec sa.The SA timing remaining key lifetime reaches 0 for kB.