<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA(9.16) to Azure S2S ( Using IKV2+VTI+BGP) Not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830094#M1100234</link>
    <description>&lt;P&gt;Sorry i must have deleted the bgp config when i posted it here :&lt;/P&gt;&lt;P&gt;router bgp 65000&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;bgp graceful-restart&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor 172.16.0.254 remote-as 65515&lt;BR /&gt;neighbor 172.16.0.254 ebgp-multihop 255&lt;BR /&gt;neighbor 172.16.0.254 activate&lt;BR /&gt;network 192.168.44.0&lt;BR /&gt;network 192.168.100.0 mask 255.255.255.252&lt;BR /&gt;no auto-summary&lt;BR /&gt;no synchronization&lt;BR /&gt;exit-address-family&lt;/P&gt;&lt;P&gt;BGP on both sides&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 07 May 2023 16:38:59 GMT</pubDate>
    <dc:creator>machine23</dc:creator>
    <dc:date>2023-05-07T16:38:59Z</dc:date>
    <item>
      <title>ASA(9.16) to Azure S2S ( Using IKV2+VTI+BGP) Not working</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830067#M1100232</link>
      <description>&lt;P&gt;Hi All ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have been at it for a long time&amp;nbsp; ! The connection wont establish &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Attched is the config applied on the ASA which is generated on Azure*&lt;/P&gt;&lt;P&gt;Configuration of the ASA -:&lt;/P&gt;&lt;P&gt;Hardware: ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.16(3)23&lt;BR /&gt;!&lt;BR /&gt;hostname&lt;BR /&gt;domain-name **********&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.44.1 255.255.254.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.792&lt;BR /&gt;vlan 792&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 184.55.56.44 255.255.255.224&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1&lt;BR /&gt;nameif AZURE&lt;BR /&gt;ip address 192.168.100.1 255.255.255.252&lt;BR /&gt;tunnel source interface Outside&lt;BR /&gt;tunnel destination 51.142.82.44&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel protection ipsec profile AZURE-PROPOSAL&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 x.x.x.23 1&lt;BR /&gt;route LINK 10.20.20.0 255.255.252.0 1.1.1.2 1&lt;BR /&gt;route Outside AZURE-PUBLIC IP 255.255.255.255 x.x.x.23 1&lt;BR /&gt;route AZURE 172.16.0.254 255.255.255.255 192.168.100.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;group-policy AZURE-PUBLIC IP internal&lt;BR /&gt;group-policy AZURE-PUBLIC IP attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2&lt;/P&gt;&lt;P&gt;group-policy AZURE internal&lt;BR /&gt;group-policy AZURE attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;tunnel-group AZURE-PUBLIC IP type ipsec-l2l&lt;BR /&gt;tunnel-group AZURE-PUBLIC IP general-attributes&lt;BR /&gt;default-group-policy AZURE-PUBLIC IP&lt;BR /&gt;tunnel-group AZURE-PUBLIC IP ipsec-attributes&lt;BR /&gt;isakmp keepalive disable&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;no tunnel-group-map enable peer-ip&lt;BR /&gt;tunnel-group-map default-group AZURE-PUBLIC IP&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;On Azure Local Network Gateway -&lt;/P&gt;&lt;P&gt;- BGP Enabled&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Uses Default IPsec/Ike policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If anyones got any pointers please let me know&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;BR /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 07 May 2023 16:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830067#M1100232</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2023-05-07T16:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA(9.16) to Azure S2S ( Using IKV2+VTI+BGP) Not working</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830088#M1100233</link>
      <description>&lt;P&gt;I dont get it one side use bgp and other not ?&lt;/P&gt;</description>
      <pubDate>Sun, 07 May 2023 16:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830088#M1100233</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-07T16:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA(9.16) to Azure S2S ( Using IKV2+VTI+BGP) Not working</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830094#M1100234</link>
      <description>&lt;P&gt;Sorry i must have deleted the bgp config when i posted it here :&lt;/P&gt;&lt;P&gt;router bgp 65000&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;bgp graceful-restart&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor 172.16.0.254 remote-as 65515&lt;BR /&gt;neighbor 172.16.0.254 ebgp-multihop 255&lt;BR /&gt;neighbor 172.16.0.254 activate&lt;BR /&gt;network 192.168.44.0&lt;BR /&gt;network 192.168.100.0 mask 255.255.255.252&lt;BR /&gt;no auto-summary&lt;BR /&gt;no synchronization&lt;BR /&gt;exit-address-family&lt;/P&gt;&lt;P&gt;BGP on both sides&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 May 2023 16:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830094#M1100234</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2023-05-07T16:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA(9.16) to Azure S2S ( Using IKV2+VTI+BGP) Not working</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830098#M1100235</link>
      <description>&lt;P&gt;So you run bgp over vti? If yes then why you don't use vti ip as neighbor??&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 May 2023 16:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4830098#M1100235</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-07T16:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA(9.16) to Azure S2S ( Using IKV2+VTI+BGP) Not working</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4831531#M1100268</link>
      <description>&lt;P&gt;Hi the issue was the following&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 - the azure generated configuration had some errors on the networks for the bgp&amp;nbsp;&lt;/P&gt;&lt;P&gt;2- my Asa does not support DH 2 as it’s insecure , so created a custom policy on azure side and connection is up !&lt;/P&gt;&lt;P&gt;thanks Cisco world for trying to solve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2023 07:26:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-16-to-azure-s2s-using-ikv2-vti-bgp-not-working/m-p/4831531#M1100268</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2023-05-09T07:26:32Z</dc:date>
    </item>
  </channel>
</rss>

