<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing Issue over VPN IPsec (2 Peers) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4062934#M1069050</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;As i previously said, you need to configure your side as "originate-only", so you can configure the two peers and have fallback between the two peers. Yes, correct, you need to initiate the fallback, that's why i said you need to have isakmp keepalives on at the tunnel-group level, so that while your primary tunnel is active and there is a failure in the path, you detect that and try to bring up the tunnel with the second peer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
    <pubDate>Thu, 09 Apr 2020 17:05:16 GMT</pubDate>
    <dc:creator>Cristian Matei</dc:creator>
    <dc:date>2020-04-09T17:05:16Z</dc:date>
    <item>
      <title>Routing Issue over VPN IPsec (2 Peers)</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4048413#M1067926</link>
      <description>&lt;P&gt;Hy guys I have the following scenario and problem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA 5516-X&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.6(1) &amp;lt;context&amp;gt;&lt;BR /&gt;Device Manager Version 7.6(1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Escenario:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;I have a connection with one of our clients through VPN L2L with 2 different IPs, the idea is to have an active / backup scenario, As you probably know the idea is if the Active Peer have any problem our client is able to switch to the Backup Peer&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Active Peer 100.100.100.1&lt;/LI&gt;&lt;LI&gt;Backup Peer 200.200.200.1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;For Phase 1: both peers are UP&lt;/P&gt;&lt;P&gt;For Phase 2: Only Active Peer is UP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Phase 1 Status:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;H6&gt;1 IKE Peer: 100.100.100.1&lt;BR /&gt;Type : L2L Role : responder&lt;BR /&gt;Rekey : no State : MM_ACTIVE&lt;/H6&gt;&lt;H6&gt;2 IKE Peer: 200.200.200.1&lt;BR /&gt;Type : L2L Role : responder&lt;BR /&gt;Rekey : no State : MM_ACTIVE&lt;/H6&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Phase 2 Status:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;H6&gt;ASA-MDC-US-1/FW-QUALITA-US# show crypto ipsec sa peer 100.100.100.1 | inc #pkts&lt;/H6&gt;&lt;H6&gt;#pkts encaps: 2882, #pkts encrypt: 2882, #pkts digest: 2882&lt;BR /&gt;#pkts decaps: 2870, #pkts decrypt: 2870, #pkts verify: 2870&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/H6&gt;&lt;H6&gt;ASA# show crypto ipsec sa peer 200.200.200.1&lt;/H6&gt;&lt;H6&gt;There are no ipsec sas for peer 200.200.200.1&lt;/H6&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Problem:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;When the Active Peer has problems, the client tries to switch to the Backup Peer (200.200.200.1) and phase 2 does not comes UP, it continues to send traffic to the Active Peer (100.100.100.1) even when we clear the tunnel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I cheked my VPN and route configuration and seems fine, unless Im missing something&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;VPN Configuracion for Phase 2:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;H6&gt;crypto map INET_map2 2 match address INET_cryptomap_1&lt;BR /&gt;crypto map INET_map2 2 set peer 100.100.100.1 200.200.200.1&lt;BR /&gt;crypto map INET_map2 2 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map INET_map2 2 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map INET_map2 2 set security-association lifetime kilobytes unlimited&lt;/H6&gt;&lt;H6&gt;&lt;FONT color="#0000FF"&gt;I understand that the first IP should be the primary or active IP and the other the secondary, so I understand that it will prefer the 100.100.100.1 unless the client stop send traffic to that IP and starts sending traffic to the second IP "200.200.200.1"&lt;/FONT&gt;&lt;/H6&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Routing Configuracion:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;H6&gt;route INET 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;route INET 100.100.100.1 255.255.255.255 192.168.1.1 5&lt;BR /&gt;route INET 200.200.200.1 255.255.255.255 192.168.1.1 10&lt;/H6&gt;&lt;H6&gt;&lt;FONT color="#0000FF"&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;For routing, we put the preferred peer to have a preferred route with better metric than the secondary peer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H6&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the other side the client has two interfaces:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Interface a: 100.100.100.1&lt;/LI&gt;&lt;LI&gt;Interface b: 200.200.200.1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Normally its send all the traffic through Interface a.&lt;/P&gt;&lt;P&gt;The mecanism to execute the switchover its to send all the traffic through interface b&lt;/P&gt;&lt;P&gt;Regarding VPN configuracion they use the same mechanism as me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for all the support you can give me&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 00:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4048413#M1067926</guid>
      <dc:creator>fabio Baruzzi</dc:creator>
      <dc:date>2020-03-19T00:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: Routing Issue over VPN IPsec (2 Peers)</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4048821#M1067951</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Is the other side an ASA as well? Configure your side as "originate-only" and the remote side as "answer-only"; note that this is a per VPN tunnel connection, not globally per crypto-map, so it doesn't affect other tunnels build off the same crypto-map:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto map INET_map2 2 set&amp;nbsp;connection-type originate-only&amp;nbsp;&lt;STRONG&gt;on your side&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto map XXX Y set&amp;nbsp;connection-type answer-only&amp;nbsp;&lt;STRONG&gt;on remote side&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 17:15:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4048821#M1067951</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-19T17:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: Routing Issue over VPN IPsec (2 Peers)</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4062473#M1069024</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt;&amp;nbsp;&lt;SPAN class="UserName lia-user-name lia-user-rank-Collaborator lia-component-message-view-widget-author-username"&gt;thanks for the reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Collaborator lia-component-message-view-widget-author-username"&gt;I was testing this solution and the problem is that two peer &lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;cannot coexist&lt;/SPAN&gt;&lt;/SPAN&gt; on the same VPN configuration and I need it for redundancy, below I show you the output&lt;/SPAN&gt;&lt;/P&gt;&lt;H6&gt;ASA-(config)# crypto map INET_map2 10 set connection-type answer-only&lt;BR /&gt;WARNING: This will remove all but the first peer from the list&lt;BR /&gt;ASA-(config)#&lt;BR /&gt;ASA-(config)# crypto map INET_map2 10 set peer 107.21.150.22&lt;BR /&gt;ERROR: Multiple Peers cannot be specified with answer-only connections&lt;BR /&gt;ASA-US(config)#&lt;/H6&gt;&lt;P&gt;Another thing we see very strange is that when, for some reason, the VPN goes down, only my side is able to send traffic and open the tunnel, the other side can't.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Finally answering your previous question, the other side of the tunnel is Amazon Web Services (AWS)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 07:39:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4062473#M1069024</guid>
      <dc:creator>fabio Baruzzi</dc:creator>
      <dc:date>2020-04-09T07:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: Routing Issue over VPN IPsec (2 Peers)</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4062934#M1069050</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;As i previously said, you need to configure your side as "originate-only", so you can configure the two peers and have fallback between the two peers. Yes, correct, you need to initiate the fallback, that's why i said you need to have isakmp keepalives on at the tunnel-group level, so that while your primary tunnel is active and there is a failure in the path, you detect that and try to bring up the tunnel with the second peer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 17:05:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4062934#M1069050</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-09T17:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: Routing Issue over VPN IPsec (2 Peers)</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4067251#M1069240</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt; thanks again for yor reply, I just want to comment that in the comunication behaivior im not really the one that originate the traffic&amp;nbsp; im the receiver, once mentioning this, your proposol still applies?&lt;/P&gt;&lt;P&gt;Regarding the keepalive I already have them configured on the both tunnel groups, bellow I show you the configuration of both peers at this moment&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;tunnel-group 100.100.100.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 100.100.100.1 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_TunnelA&lt;BR /&gt;tunnel-group 100.100.100.1 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;isakmp keepalive threshold 10 retry 10&lt;BR /&gt;!&lt;BR /&gt;tunnel-group 200.200.200.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 200.200.200.1 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_TunnelB&lt;BR /&gt;tunnel-group 200.200.200.1 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;isakmp keepalive threshold 10 retry 10&lt;BR /&gt;!&lt;BR /&gt;crypto map INET_map2 10 match address INET_cryptomap_10&lt;BR /&gt;crypto map INET_map2 10 set pfs &lt;BR /&gt;crypto map INET_map2 10 set peer 100.100.100.1 200.200.200.1 &lt;BR /&gt;crypto map INET_map2 10 set ikev1 transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map INET_map2 10 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map INET_map2 10 set security-association lifetime kilobytes unlimited&lt;BR /&gt;!&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this sense can you guide me wuth an example workaround that I can apply in my current scenario?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2020 14:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-over-vpn-ipsec-2-peers/m-p/4067251#M1069240</guid>
      <dc:creator>fabio Baruzzi</dc:creator>
      <dc:date>2020-04-16T14:34:26Z</dc:date>
    </item>
  </channel>
</rss>

