Does the VPN connection's access lists permit traffic from the tunnel that does not work? You have access lists on the firewalls that determine which traffic gets tunnelled. Do you admin the pix on the far side of the tunnel? The capture command (on 6.2+ PIX OS) is very handy. That, and debug icmp (or debug ip icmp) might be helpful. On the pix, a show crypto ipsec sa would show if there is a SA for the subnet that is problematic - the sh cry ips sa output should have a SA for each subnet to subnet pairing that deserves encryption as defined by the crypto access-lists
OSTIGUY
5 Posts
0
June 6th, 2007 12:00
Decompression
7 Posts
0
June 6th, 2007 13:00