Triplejolt
IS-IT--Management
Hiya.
I've looked all over Cisco's site and searched this forum for answers, but I don't seem to find any that can explain why my PIX515e fails to initiate and establish a 2nd Site-2-Site VPN tunnel. I've even gone as far as copying the previous s2s config, but still the PIX doesn't seem to initiate. Calling up and asking the other end to initiate the tunnel seems to be the way to go about it. The negotiations work as intended and the VPN tunnel gets established. Seeing as our PIX is the one who should initiate this, I can't really rely on calling up the other end each time the VPN tunnels times out and disconnects.... I'm stuck and really need a second opinion here. I'm gonna turn to Tek-tips for help
Here's the config:
A firm beleiver of "Keep it Simple" philosophy
Cheers
/T
I've looked all over Cisco's site and searched this forum for answers, but I don't seem to find any that can explain why my PIX515e fails to initiate and establish a 2nd Site-2-Site VPN tunnel. I've even gone as far as copying the previous s2s config, but still the PIX doesn't seem to initiate. Calling up and asking the other end to initiate the tunnel seems to be the way to go about it. The negotiations work as intended and the VPN tunnel gets established. Seeing as our PIX is the one who should initiate this, I can't really rely on calling up the other end each time the VPN tunnels times out and disconnects.... I'm stuck and really need a second opinion here. I'm gonna turn to Tek-tips for help
Here's the config:
Code:
access-list cryptomap1 permit ip 192.168.100.0 255.255.255.0 [working s2s]
access-list cryptomap2 permit ip 192.168.100.0 255.255.255.0 [non-working s2s]
global (outside) 3 [public IP]
global (outside) 2 [public IP]
nat (inside) 3 access-list cryptomap1 0 0
nat (inside) 2 access-list cryptomap2 0 0
crypto ipsec transform-set 3des-md5 esp-3des esp-md5-hmac
crypto map VPN 1 ipsec-isakmp
crypto map VPN 1 match address cryptomap1
crypto map VPN 1 set peer [working s2s]
crypto map VPN 1 set transform-set 3des-md5
crypto map VPN 2 ipsec-isakmp
crypto map VPN 2 match address cryptomap2
crypto map VPN 2 set peer [non-working s2s]
crypto map VPN 2 set transform-set 3des-md5
crypto map VPN interface outside
isakmp enable outside
isakmp key ******** address [working s2s] netmask 255.255.255.255 no-xauth
isakmp key ******** address [non-working s2s] netmask 255.255.255.255 no-xauth
isakmp identity address
isakmp keepalive 30 30
isakmp nat-traversal 20
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 2
isakmp policy 1 lifetime 86400
A firm beleiver of "Keep it Simple" philosophy
Cheers
/T