<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 9.9 IKEv2 to Microsoft Azure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-9-9-ikev2-to-microsoft-azure/m-p/3694924#M12672</link>
    <description>&lt;P&gt;In the MS document you linked, it is stated:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The sample configuration connects a Cisco ASA device to an Azure&amp;nbsp;&lt;STRONG&gt;route-based&lt;/STRONG&gt;&amp;nbsp;VPN gateway. The connection uses a custom IPsec/IKE policy with the&amp;nbsp;&lt;STRONG&gt;UsePolicyBasedTrafficSelectors&lt;/STRONG&gt;&amp;nbsp;option, as described in&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps" data-linktype="relative-path" target="_blank"&gt;this article&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The sample requires that ASA devices use the&amp;nbsp;&lt;STRONG&gt;IKEv2&lt;/STRONG&gt;&amp;nbsp;policy with access-list-based configurations, not VTI-based. Consult your VPN device vendor specifications to verify that the IKEv2 policy is supported on your on-premises VPN devices.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you use Route based VPN, the crypto proxies are "any to any". With Policy based, the proxies are specific networks. Try setting your Azure setup as per this document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another reference document is:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/site-to-site-vpn-between-cisco-asa-and-microsoft-azure-virtual/ba-p/3099317" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/site-to-site-vpn-between-cisco-asa-and-microsoft-azure-virtual/ba-p/3099317&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 25 Aug 2018 15:24:34 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2018-08-25T15:24:34Z</dc:date>
    <item>
      <title>Cisco ASA 9.9 IKEv2 to Microsoft Azure</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-9-ikev2-to-microsoft-azure/m-p/3694890#M12669</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I followed exactly this article:&amp;nbsp;&lt;A href="https://docs.microsoft.com/nl-nl/azure/vpn-gateway/vpn-gateway-3rdparty-device-config-cisco-asa" target="_blank"&gt;https://docs.microsoft.com/nl-nl/azure/vpn-gateway/vpn-gateway-3rdparty-device-config-cisco-asa&lt;/A&gt; but my tunnel is not working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems as the problem is at Phase 1 already, but i can't find the problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the output of "debug crypto ikev2 platform 250":&lt;/P&gt;
&lt;PRE&gt;CONNECTION STATUS: DOWN... peer: 104.X.X.X:500, phase1_id: 104.X.X.X
IKEv2-PLAT-4: (236): IKEv2 session deregistered from session manager. Reason: 19
IKEv2-PLAT-4: (236): session manager killed ikev2 tunnel. Reason: Peer Reconnected
IKEv2-PLAT-4: (236): Deleted associated IKE flow: Internet, 194.X.X.X:62465 &amp;lt;-&amp;gt; 104.X.X.X:62465
IKEv2-PLAT-4: (236): PSH cleanup
IKEv2-PLAT-7: Active ike sa request deleted
IKEv2-PLAT-7: Decrement count for incoming active
IKEv2-PLAT-4: (322): Encrypt success status returned via ipc 1
IKEv2-PLAT-5: (322): SENT PKT [IKE_AUTH] [194.X.X.X]:500-&amp;gt;[104.X.X.X]:500 InitSPI=0x20618498d56bf500 RespSPI=0xe0a361abf2ea3f39 MID=00000001
IKEv2-PLAT-7: New ikev2 sa request activated
IKEv2-PLAT-7: Decrement count for incoming negotiating
IKEv2-PLAT-4:
CONNECTION STATUS: UP... peer: 104.X.X.X:500, phase1_id: 104.X.X.X
IKEv2-PLAT-4: (322): connection auth hdl set to 1834
IKEv2-PLAT-4: (322): AAA conn attribute retrieval successfully queued for register session request.
IKEv2-PLAT-4: (322): idle timeout set to: 30
IKEv2-PLAT-4: (322): session timeout set to: 0
IKEv2-PLAT-4: (322): group policy set to DfltGrpPolicy
IKEv2-PLAT-4: (322): class attr set
IKEv2-PLAT-4: (322): tunnel protocol set to: 0x5c
IKEv2-PLAT-4: (322): IPv4 filter ID not configured for connection
IKEv2-PLAT-4: (322): group lock set to: none
IKEv2-PLAT-4: (322): IPv6 filter ID not configured for connection
IKEv2-PLAT-4: (322): connection attributes set valid to TRUE
IKEv2-PLAT-4: (322): Successfully retrieved conn attrs
IKEv2-PLAT-4: (322): Session registration after conn attr retrieval PASSED, No error
IKEv2-PLAT-4: (322): connection auth hdl set to -1
IKEv2-PLAT-4:
CONNECTION STATUS: REGISTERED... peer: 104.X.X.X:500, phase1_id: 104.X.X.X
IKEv2-PLAT-4: mib_index set to: 501
IKEv2-PLAT-5: RECV PKT [INFORMATIONAL] [84.X.X.X]:63220-&amp;gt;[194.X.X.X]:4500 InitSPI=0x39926fd98abbec5d RespSPI=0x8bb5192cb4642889 MID=00000047
IKEv2-PLAT-4: (84): Decrypt success status returned via ipc 1
IKEv2-PLAT-4: (84): Encrypt success status returned via ipc 1
IKEv2-PLAT-5: (84): SENT PKT [INFORMATIONAL] [194.X.X.X]:4500-&amp;gt;[84.X.X.X]:63220 InitSPI=0x39926fd98abbec5d RespSPI=0x8bb5192cb4642889 MID=00000047
IKEv2-PLAT-5: RECV PKT [INFORMATIONAL] [84.105.58.240]:54109-&amp;gt;[194.X.X.X]:4500 InitSPI=0x0d0808d78596ff96 RespSPI=0x6867d1943f56f4cc MID=0000002a
IKEv2-PLAT-4: (328): Decrypt success status returned via ipc 1
IKEv2-PLAT-4: (328): Encrypt success status returned via ipc 1
IKEv2-PLAT-5: (328): SENT PKT [INFORMATIONAL] [194.X.X.X]:4500-&amp;gt;[84.105.58.240]:54109 InitSPI=0x0d0808d78596ff96 RespSPI=0x6867d1943f56f4cc MID=0000002a
IKEv2-PLAT-5: RECV PKT [INFORMATIONAL] [84.X.X.X]:63220-&amp;gt;[194.X.X.X]:4500 InitSPI=0x39926fd98abbec5d RespSPI=0x8bb5192cb4642889 MID=00000048
IKEv2-PLAT-4: (84): Decrypt success status returned via ipc 1
IKEv2-PLAT-4: (84): Encrypt success status returned via ipc 1
IKEv2-PLAT-5: (84): SENT PKT [INFORMATIONAL] [194.X.X.X]:4500-&amp;gt;[84.X.X.X]:63220 InitSPI=0x39926fd98abbec5d RespSPI=0x8bb5192cb4642889 MID=00000048
IKEv2-PLAT-5: RECV PKT [INFORMATIONAL] [84.105.58.240]:54109-&amp;gt;[194.X.X.X]:4500 InitSPI=0x0d0808d78596ff96 RespSPI=0x6867d1943f56f4cc MID=0000002b
IKEv2-PLAT-4: (328): Decrypt success status returned via ipc 1
IKEv2-PLAT-4: (328): Encrypt success status returned via ipc 1
IKEv2-PLAT-5: (328): SENT PKT [INFORMATIONAL] [194.X.X.X]:4500-&amp;gt;[84.105.58.240]:54109 InitSPI=0x0d0808d78596ff96 RespSPI=0x6867d1943f56f4cc MID=0000002b
IKEv2-PLAT-5: RECV PKT [IKE_SA_INIT] [104.X.X.X]:500-&amp;gt;[194.X.X.X]:500 InitSPI=0x4be6e27668dd7dbc RespSPI=0x0000000000000000 MID=00000000
IKEv2-PLAT-4: Process custom VID payloads
IKEv2-PLAT-7: New ikev2 sa request admitted
IKEv2-PLAT-7: Incrementing incoming negotiating sa count by one
IKEv2-PLAT-7: INVALID PSH HANDLE
IKEv2-PLAT-7: INVALID PSH HANDLE
IKEv2-PLAT-4: (323): my auth method set to: 0
Adding trusted issuer hash to send. Hash:
     17 9a 00 9b e8 c9 e7 a4 07 6a 47 f4 ef ef 30 fb
     45 c3 78 09
Adding trusted issuer hash to send. Hash:
     6d b7 b6 82 b6 65 ca 12 51 8e 64 69 c5 b0 5a 0e
     b2 4b 8b b7
Adding trusted issuer hash to send. Hash:
     75 b1 bc dd db be 95 b8 7a 80 9c b6 99 a1 44 d2
     1b 74 eb 3d
Adding trusted issuer hash to send. Hash:
     4d d6 7b 34 4a 29 43 5c dc 6e bd ef c0 e4 e1 a3
     77 2a ec a0
IKEv2-PLAT-5: (323): SENT PKT [IKE_SA_INIT] [194.X.X.X]:500-&amp;gt;[104.X.X.X]:500 InitSPI=0x4be6e27668dd7dbc RespSPI=0x31395cf3cf8433b8 MID=00000000
IKEv2-PLAT-5: RECV PKT [IKE_AUTH] [104.X.X.X]:500-&amp;gt;[194.X.X.X]:500 InitSPI=0x4be6e27668dd7dbc RespSPI=0x31395cf3cf8433b8 MID=00000001
IKEv2-PLAT-4: (323): Decrypt success status returned via ipc 1
IKEv2-PLAT-4: (323): peer auth method set to: 2
IKEv2-PLAT-4: (323): Site to Site connection detected
IKEv2-PLAT-4: attempting to find tunnel group for ID: 104.X.X.X
IKEv2-PLAT-4: mapped to tunnel group 104.X.X.X using phase 1 ID
IKEv2-PLAT-4: tg_name set to: 104.X.X.X
IKEv2-PLAT-4: tunn grp type set to: L2L
IKEv2-PLAT-4: (323): my auth method set to: 2
IKEv2-PLAT-4: my_auth_method = 2
IKEv2-PLAT-4: supported_peers_auth_method = 2
IKEv2-PLAT-4: (323): P1 ID = 255
IKEv2-PLAT-4: (323): Completed authentication for connection
IKEv2-PLAT-4: Build config mode reply: no request stored
IKEv2-PLAT-4: checking access status for src=0.0.0.0 dst 0.0.0.0 s_port = 0 d_port = 0, proto = 0
IKEv2-PLAT-4: (323): Crypto Map: No proxy match on map AZURE-LSP-MAP seq 1
IKEv2-PLAT-4: (323): Crypto map: Skipping dynamic map Internet_dyn_map sequence 65535: cannot match peerless map when peer found in previous map entry.IKEv2-PLAT-4:
CONNECTION STATUS: DOWN... peer: 104.X.X.X:500, phase1_id: 104.X.X.X
IKEv2-PLAT-4: (322): IKEv2 session deregistered from session manager. Reason: 19
IKEv2-PLAT-4: (322): session manager killed ikev2 tunnel. Reason: Peer Reconnected
IKEv2-PLAT-4: (322): Deleted associated IKE flow: Internet, 194.X.X.X:62465 &amp;lt;-&amp;gt; 104.X.X.X:62465
IKEv2-PLAT-4: (322): PSH cleanup
IKEv2-PLAT-7: Active ike sa request deleted
IKEv2-PLAT-7: Decrement count for incoming active
IKEv2-PLAT-4: (323): Encrypt success status returned via ipc 1
IKEv2-PLAT-5: (323): SENT PKT [IKE_AUTH] [194.X.X.X]:500-&amp;gt;[104.X.X.X]:500 InitSPI=0x4be6e27668dd7dbc RespSPI=0x31395cf3cf8433b8 MID=00000001
IKEv2-PLAT-7: New ikev2 sa request activated
IKEv2-PLAT-7: Decrement count for incoming negotiating
IKEv2-PLAT-4:
CONNECTION STATUS: UP... peer: 104.X.X.X:500, phase1_id: 104.X.X.X
IKEv2-PLAT-4: (323): connection auth hdl set to 1835
IKEv2-PLAT-4: (323): AAA conn attribute retrieval successfully queued for register session request.
IKEv2-PLAT-4: (323): idle timeout set to: 30
IKEv2-PLAT-4: (323): session timeout set to: 0
IKEv2-PLAT-4: (323): group policy set to DfltGrpPolicy
IKEv2-PLAT-4: (323): class attr set
IKEv2-PLAT-4: (323): tunnel protocol set to: 0x5c
IKEv2-PLAT-4: (323): IPv4 filter ID not configured for connection
IKEv2-PLAT-4: (323): group lock set to: none
IKEv2-PLAT-4: (323): IPv6 filter ID not configured for connection
IKEv2-PLAT-4: (323): connection attributes set valid to TRUE
IKEv2-PLAT-4: (323): Successfully retrieved conn attrs
IKEv2-PLAT-4: (323): Session registration after conn attr retrieval PASSED, No error
IKEv2-PLAT-4: (323): connection auth hdl set to -1
IKEv2-PLAT-4:
CONNECTION STATUS: REGISTERED... peer: 104.X.X.X:500, phase1_id: 104.X.X.X
IKEv2-PLAT-4: mib_index set to: 501
IKEv2-PLAT-5: RECV PKT [INFORMATIONAL] [84.X.X.X]:63220-&amp;gt;[194.X.X.X]:4500 InitSPI=0x39926fd98abbec5d RespSPI=0x8bb5192cb4642889 MID=00000049
IKEv2-PLAT-4: (84): Decrypt success status returned via ipc 1
IKEv2-PLAT-4: (84): Encrypt success status returned via ipc 1
IKEv2-PLAT-5: (84): SENT PKT [INFORMATIONAL] [194.X.X.X]:4500-&amp;gt;[84.X.X.X]:63220 InitSPI=0x39926fd98abbec5d RespSPI=0x8bb5192cb4642889 MID=00000049
undebug all
&lt;/PRE&gt;
&lt;P&gt;I don't get these lines:&lt;/P&gt;
&lt;PRE&gt;IKEv2-PLAT-4: checking access status for src=0.0.0.0 dst 0.0.0.0 s_port = 0 d_port = 0, proto = 0
IKEv2-PLAT-4: (323): Crypto Map: No proxy match on map AZURE-LSP-MAP seq 1&lt;/PRE&gt;
&lt;P&gt;Why am i seeing "src=0.0.0.0" and "dst 0.0.0.0" there?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone has an idea how to solve this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please be aware that the IP starting with 84.x.x.x in this case is from AnyConnect, that's working fine. It's about the 104.x.x.x address and 194.x.x.x address&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-9-ikev2-to-microsoft-azure/m-p/3694890#M12669</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2020-02-21T16:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.9 IKEv2 to Microsoft Azure</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-9-ikev2-to-microsoft-azure/m-p/3694924#M12672</link>
      <description>&lt;P&gt;In the MS document you linked, it is stated:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The sample configuration connects a Cisco ASA device to an Azure&amp;nbsp;&lt;STRONG&gt;route-based&lt;/STRONG&gt;&amp;nbsp;VPN gateway. The connection uses a custom IPsec/IKE policy with the&amp;nbsp;&lt;STRONG&gt;UsePolicyBasedTrafficSelectors&lt;/STRONG&gt;&amp;nbsp;option, as described in&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps" data-linktype="relative-path" target="_blank"&gt;this article&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The sample requires that ASA devices use the&amp;nbsp;&lt;STRONG&gt;IKEv2&lt;/STRONG&gt;&amp;nbsp;policy with access-list-based configurations, not VTI-based. Consult your VPN device vendor specifications to verify that the IKEv2 policy is supported on your on-premises VPN devices.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you use Route based VPN, the crypto proxies are "any to any". With Policy based, the proxies are specific networks. Try setting your Azure setup as per this document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another reference document is:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/site-to-site-vpn-between-cisco-asa-and-microsoft-azure-virtual/ba-p/3099317" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/site-to-site-vpn-between-cisco-asa-and-microsoft-azure-virtual/ba-p/3099317&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Aug 2018 15:24:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-9-ikev2-to-microsoft-azure/m-p/3694924#M12672</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-08-25T15:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.9 IKEv2 to Microsoft Azure</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-9-ikev2-to-microsoft-azure/m-p/3695044#M12675</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Azure by default uses route based vpn.&lt;/P&gt;
&lt;P&gt;If on ASA, you are running policy based vpn and not route based(VTI based), you can use powershell to configure policy based vpn on Azure by using below link:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps&amp;nbsp;" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We had similar issues and we got sorted this out by configuring policy based parameter on AZure using Powershell CLI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One more thing - define any any ACL in crypto ACL and use VPN filter to filter the traffic instead of specifying multiple ACL under crypto MAP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Sun, 26 Aug 2018 07:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-9-ikev2-to-microsoft-azure/m-p/3695044#M12675</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-08-26T07:20:57Z</dc:date>
    </item>
  </channel>
</rss>

