<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASAv site-to-site VPN to Symantec Web Security Service (WSS) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4128179#M1072454</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No. Its been a nightmare. I had a case open with Cisco but I could only troubleshoot at my end of the VPN with TAC. Symantec or Broadcom just kicked us to the Curb. Now I have a third party consultant who is going to help me with the VPN - sounds like a bit of a joke considering i had this working absolutely fine with a Fortigate FW.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco TAC seem to think its the Pre-shared Key, however it was pasted from the broadcom portal &amp;gt; notepad &amp;gt; VPN config on the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will update soon as things are progressing. Once i get this working i will provide full details.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you facing the same issue?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jul 2020 16:31:26 GMT</pubDate>
    <dc:creator>davinder2010</dc:creator>
    <dc:date>2020-07-30T16:31:26Z</dc:date>
    <item>
      <title>Cisco ASAv site-to-site VPN to Symantec Web Security Service (WSS)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4072779#M1069452</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm having some serious technical issues with establishing a site-to-site VPN to Symantec's Web Security Service (WSS). Getting technical support to help is also really really painful. After three months of pulling my hair out I finally had a WebEX troubleshooting session, but unfortunately it was unsuccessful and we didn't get anywhere.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my setup&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Customer FW&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAT - Edge FW&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ep.threatpulse.net&lt;/P&gt;&lt;P&gt;{Multiple DMZ s / LANS}-----(&amp;gt;|) ASA FW ---------- (FGT-FW)-----------(Internet)---------(Symantec WSS)---(Proxy)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The customer firewall is the&amp;nbsp; ASAv Firewall&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Fortigate is a perimeter firewall for all customers and NATs the outside interface of the ASA firewall&amp;nbsp; to a Public IP address and in terms of security policy its wide open (any any). The ASA is more restrictive.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I followed the following KB from Symantec (or Broadcom as they are currently known as) but with some tweaks. I will explain:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;KB:&amp;nbsp;&lt;A href="https://knowledge.broadcom.com/external/article/174263/web-security-service-legacy-ipsec-connec.html" target="_blank" rel="noopener"&gt;https://knowledge.broadcom.com/external/article/174263/web-security-service-legacy-ipsec-connec.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; Note: in other articles they have variations in config which i had to follow such as&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT-T when used, you need to change the IKE ID to the public IP address that the upstreat fw is natting the ASAs outside IP to. I had to do this on the ASA via ASDM, but it can be done on the CLI as&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto isakmp identity&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;key-id &amp;lt;Public IP Address&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also didn't follow their advise on 'any' local encryption domain and 'any' remote encryption domain - I caused an outage whilst the firewall tried to bring up the tunnel. instead i used the classless RFC 1918 address as my local encryption domain and ep.threatpulse.net (ip address used) as the remote, i.e. the symantec proxy ip address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have other VPN tunnels setup on this firewall and even if my local encryption domain was set to 'any' it would have overlapped with the other tunnels - the firewall did grumble at this!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did NAT exempt for traffic headed for the proxy ip address for http and https.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used the same phase 1 and phase 2 settings and whats interesting is that Symantec in Phase 1 tries to negotiate 3DES / SHA DFH grp5.... strange.... The ASA didnt like..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I went through the setup with Symantec over the WebEx and they said it looked ok, however they didnt see any errors or messages that would indicate that phase 1 was unsuccessful. At my end though all i ever got when running show crypto ikev1 sa was the message telling me it was waiting for a response from symantec:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;State : MM_WAIT_MSG6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even if i change the phase 1 params to 3des sha DFH group 5 it still doesn't come up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its not successfully negotiating phase 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone else experiencing this issue and the lack of support from Symantec?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 21:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4072779#M1069452</guid>
      <dc:creator>davinder2010</dc:creator>
      <dc:date>2020-04-23T21:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASAv site-to-site VPN to Symantec Web Security Service (WSS)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4108943#M1071407</link>
      <description>Were you able to get this issue resolved in the end? Would appreciate any potential guidance you could offer.</description>
      <pubDate>Wed, 24 Jun 2020 19:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4108943#M1071407</guid>
      <dc:creator>HaydenRoss27912</dc:creator>
      <dc:date>2020-06-24T19:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASAv site-to-site VPN to Symantec Web Security Service (WSS)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4128179#M1072454</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No. Its been a nightmare. I had a case open with Cisco but I could only troubleshoot at my end of the VPN with TAC. Symantec or Broadcom just kicked us to the Curb. Now I have a third party consultant who is going to help me with the VPN - sounds like a bit of a joke considering i had this working absolutely fine with a Fortigate FW.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco TAC seem to think its the Pre-shared Key, however it was pasted from the broadcom portal &amp;gt; notepad &amp;gt; VPN config on the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will update soon as things are progressing. Once i get this working i will provide full details.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you facing the same issue?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 16:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4128179#M1072454</guid>
      <dc:creator>davinder2010</dc:creator>
      <dc:date>2020-07-30T16:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASAv site-to-site VPN to Symantec Web Security Service (WSS)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4146693#M1073605</link>
      <description>&lt;P&gt;Got this working via Certificate authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can't use firewall/vpn with preshare key behind a NAT.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The FQDN option didnt work for me, changing the ike id as the docs suggest dont work plus didnt have time to debug fully. Was getting auth errors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Follow this guide if behind a NAT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledge.broadcom.com/external/article/174854/web-security-service-legacy-ipsec-connec.html" target="_blank" rel="noopener"&gt;https://knowledge.broadcom.com/external/article/174854/web-security-service-legacy-ipsec-connec.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The cert from entrust mentioned in the link above didnt work for me. However another symantec article mentions to use this cert, this worked:&lt;/P&gt;&lt;DIV class="rootcert rootcert-top"&gt;&lt;H2&gt;Entrust Root Certificate Authority&lt;/H2&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Valid Until:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;11/27/2026&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Serial Number:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;45 6b 50 54&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thumbprint:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;b3 1e b1 b7 40 e3 6c 84 02 da dc 37 d4 4d f5 d4 67 49 52 f9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 04 Sep 2020 23:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4146693#M1073605</guid>
      <dc:creator>davinder2010</dc:creator>
      <dc:date>2020-09-04T23:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASAv site-to-site VPN to Symantec Web Security Service (WSS)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4386109#M1080012</link>
      <description>&lt;P&gt;An update to this post, Symantec as of the 9th April 2021 are now no longer using the certificate based authentication method, it has been deprecated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The best way to get this working is if your device is not behind a NAT. Have your external interface on a public facing transit&lt;/P&gt;</description>
      <pubDate>Tue, 13 Apr 2021 10:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asav-site-to-site-vpn-to-symantec-web-security-service-wss/m-p/4386109#M1080012</guid>
      <dc:creator>davinder2010</dc:creator>
      <dc:date>2021-04-13T10:54:38Z</dc:date>
    </item>
  </channel>
</rss>

