I get the error message on debugging ipsec-l2l tunnel

Hello

Can someone help me understand the debug message?
I get the error message on debugging ipsec-l2l tunnel

I tried to configure an ASA5520 with an ipsec-l2l to ios router 1721

= 1721 router =.

Cisco 1721 (flash: c1700-k9o3sy7 - mz.123 - 2.XC2.bin)
80.89.47.102 outside
inside 10.100.110.1 255.255.255.0

Debug crypto ipsec
Debug crypto ISAKMP

-config-
crypto ISAKMP policy 1
BA 3des
md5 hash
preshared authentication
Group 2
0 1234567890 128.39.189.10 crypto isakmp key address
!
!
Crypto ipsec transform-set esp-3des pix-series
!
ASA 10 ipsec-isakmp crypto map
defined by peer 128.39.189.10
transform-set pix - Set
match address 101
!
!
interface FastEthernet0

Outside-interface description

IP 80.89.47.102 255.255.255.252

NAT outside IP

card crypto asa

!

interface Vlan10
Inside description
IP 10.100.110.1 255.255.255.0
IP nat inside

!

!

IP nat inside source overload map route interface FastEthernet0 sheep

!

access-list 101 permit ip 10.100.110.0 0.0.0.255 10.100.4.0 0.0.3.255

!

access-list 110 deny ip 10.100.110.0 0.0.0.255 10.100.4.0 0.0.3.255
access-list 110 permit ip 10.100.110.0 0.0.0.255 any
!
sheep allowed 10 route map
corresponds to the IP 110
!

= Config ASA =.

Cisco 5520 ASA Version 8.2 (1)
128.39.189.10 outside
inside 10.100.4.255 255.255.252.0

Debug crypto ipsec
Debug crypto ISAKMP

-Config-
!
Allow Access-list extended sheep 255.255.252.0 IP 10.100.4.0 10.100.110.0 255.255.255.0
!
access extensive list ip 10.100.4.0 outside110 allow 255.255.252.0 10.100.110.0 255.255.255.0
!

Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
86400 seconds, duration of life crypto ipsec security association
Crypto ipsec kilobytes of life - safety 4608000 association
card crypto outside_map 11 match address outside110
peer set card crypto outside_map 11 80.89.47.102
card crypto outside_map 11 game of transformation-ESP-3DES-MD5
outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
md5 hash
Group 2
life 86400

!

attributes of Group Policy DfltGrpPolicy
VPN-idle-timeout no
Protocol-tunnel-VPN IPSec

!

tunnel-group 80.89.47.102 type ipsec-l2l
IPSec-attributes tunnel-group 80.89.47.102
pre-shared key 1234567890

Concerning
Tor

You have a transformation defined on the SAA named ESP-3DES-MD5? Your crypto card refers to that but I don't see it listed in the config you have posted. I don't have much experience with routers, but is MD5 hashing algoritm (and why it is not)?

James

Tags: Cisco Security

Similar Questions

Maybe you are looking for

  • W550s speaker sounds

    Hello I wanted to just make sure if I got a bad speaker or others have had the same problem. I just got the W550s by mail, and as soon as I started using it in my room, I notice a sound that the president would after all make lu sound on windows. the

  • PCI-6534 receives data to clock twice

    I have a simple test developed in place to check the operation of the card PCI-6534.  A written test generator a double-ended (hi-lo) word of 16 bits of zeros with one being bitshifted to the left (MSB).  It is sent to a custom Board that converts th

  • Problem network AirPrint

    I recently bought a HP printer of 5520e for its ability to AirPrint. I have a wireless network at home consisting of a hub of fiber of sky with two Linksys Powerline adapters. The printer is near one of the Powerline adapters. My Ipad picks up the pr

  • RV220W random reboots

    Hello I have a problem with my RV220W. It will randomly restart every day and I received the following message in the log: [rv220w] [System] [FIREWALL] fwPPTPGenericRules.c: inet_aton failed I saw an internet I can ask cisco for the Beta firmware 1.0

  • What is the photo shop where I can add and remove people on an image/background?

    What is the photo shop where I can add and remove people on an image/background?