Those who have given exam couple of times know......... Any config with up address 4x.4x.yy.zz will also tell. Also I checked some recent questions from the same poster before making my statement. Google for the question that were asked by him and you will know. Sad but it's true.
On Saturday, August 25, 2012, Brian Clarke wrote: > Confused, > > Where in the question is the poster cheating? > > I see someone asking for help, so please educate those that don't know. I > look at the sample config and it could be anything to me. > > Just thinking out loud. > > Respectfully, > Brian Clarke > > On Aug 25, 2012, at 8:23 PM, "Fawad Khan" > <[email protected]<javascript:_e({}, 'cvml', '[email protected]');>> > wrote: > > Dude if you can't figure these kind of questions then may be you need > to study more. Like Jay said , cheating is not going to take you > anywhere. > > On Saturday, August 25, 2012, Jay McMickle wrote: > >> Please do not post questions like this to this forum. Cheating will get >> you banned. >> >> Regards, >> Jay McMickle- CCIE #35355 (RS), 3x CCNP (RS,Security,Design) >> Sent from my iPhone >> >> On Aug 25, 2012, at 4:48 PM, Krishna Nagam <[email protected]> wrote: >> >> > Hi guy >> > >> > i am doing site-to-site vpn configuration configuration between Routers >> > >> > R1 and R5 both are sited in behind the ASA on ASA enable the >> nat-control protocal >> > >> > but my tunnel is not establishing >> > >> > R5 >> > >> > crypto isakmp policy 10 >> > encr 3des >> > authentication pre-share >> > group 2 >> > crypto isakmp key Cisco123 address 49.49.6.1 >> > >> > crypto ipsec transform-set vpn esp-3des esp-md5-hmac >> > ! >> > crypto ipsec profile vpn >> > set transform-set vpn >> > >> > interface Tunnel0 >> > ip address 123.1.1.5 255.255.255.0 >> > tunnel source FastEthernet0/0 >> > tunnel destination 49.49.6.1 >> > tunnel mode ipsec ipv4 >> > tunnel protection ipsec profile vpn >> > >> > interface FastEthernet0/0 >> > ip address 49.49.7.5 255.255.255.0 >> > duplex auto >> > speed auto >> > >> > R1 >> > >> > crypto isakmp policy 10 >> > encr 3des >> > authentication pre-share >> > group 2 >> > crypto isakmp key Cisco123 address 49.49.7.5 >> > >> > crypto ipsec transform-set vpn esp-3des esp-md5-hmac >> > ! >> > crypto ipsec profile vpn >> > set transform-set vpn >> > >> > interface Tunnel0 >> > ip address 123.1.1.1 255.255.255.0 >> > tunnel source FastEthernet0/0 >> > tunnel destination 49.49.7.5 >> > tunnel mode ipsec ipv4 >> > tunnel protection ipsec profile vpn >> > >> > interface FastEthernet0/0 >> > ip address 49.49.6.1 255.255.255.0 >> > duplex auto >> > speed auto >> > >> > >> > ASA >> > >> > interface Ethernet0/0 >> > nameif outside >> > security-level 0 >> > ip address 49.49.6.10 255.255.255.0 >> > ! >> > interface Ethernet0/1 >> > nameif inside >> > security-level 100 >> > ip address 49.49.7.10 255.255.255.0 >> > >> > >> > access-list outside extended permit esp host 49.49.6.1 host 49.49.7.5 >> > access-list outside extended permit udp host 49.49.6.1 host 49.49.7.5 >> eq isakmp >> > nat-control >> > >> > >> > >> > >> > >> > _______________________________________________ >> > For more information regarding industry leading CCIE Lab training, >> please visit www.ipexpert.com >> > >> > Are you a CCNP or CCIE and looking for a job? Check out >> www.PlatinumPlacement.com >> _______________________________________________ >> For more information regarding industry leading CCIE Lab training, please >> visit www.ipexpert.com >> >> Are you a CCNP or CCIE and looking for a job? Check out >> www.PlatinumPlacement.com >> > > > -- > FNK, CCIE Security#35578 > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > Are you a CCNP or CCIE and looking for a job? Check out > www.PlatinumPlacement.com > > > * * * PROPRIETARY & CONFIDENTIAL * * * The information contained within > this e-mail and any attached document(s) is confidential and/or > proprietary. It is intended solely for the use of the addressee(s) named > above. Unauthorized disclosure, photocopying, distribution or use of the > information contained herein is prohibited. If you believe that you have > received this e-mail in error, please notify me by reply transmission and > delete the message without copying or disclosing it. > -- FNK, CCIE Security#35578
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
