<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have done this and i am in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787500#M177483</link>
    <description>&lt;P&gt;I have done this and i am still unable to ping an instance IP from the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can ping the same instance from a server within the allowed range of IP's in our data center though.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;EDIT:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Adding the last persons comments actually stopped connectivity from the datacenter to aws and vice versa.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Without those lines of config, i can ping from the instance to the ASA outside interface and Datacenter DC.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can also ping from the DC in the datacenter to the instance ip, just not from the ASA, so SLA monitor isn't working!&lt;/P&gt;</description>
    <pubDate>Mon, 28 Nov 2016 03:40:41 GMT</pubDate>
    <dc:creator>shankm001</dc:creator>
    <dc:date>2016-11-28T03:40:41Z</dc:date>
    <item>
      <title>ASA VPN to AWS and IPSLA to keep tunnel alive</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787495#M177478</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've got an ASA5555-X running 9.2(3)4 that's got two tunnels to our AWS VPC. That all works perfectly and the internal LANs have access to and from the VPC EC2 instances. All good.&lt;/P&gt;
&lt;P&gt;However, during the evening when the traffic goes quiet the tunnel drops and as per AWS' documents I've been trying to get IPSLA working to keep the tunnel up.&lt;/P&gt;
&lt;P&gt;I have a local route on the ASA pointing the VPC CIDR via the outside interface's default gateway and from the ASA if I "ping inside &amp;lt;VPC_target_IP&amp;gt;" it replies ok.&lt;/P&gt;
&lt;P&gt;So I've tried to get the SLA running with:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;sla monitor 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&amp;nbsp;type echo protocol ipIcmpEcho &amp;lt;AWS_VPC_Target_IP&amp;gt; interface inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&amp;nbsp;frequency 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;But this doesn't work...&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Entry number: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Modification time: 21:08:53.035 GMT/BST Tue Nov 17 2015&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Number of Octets Used by this Entry: 2056&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Number of operations attempted: 5664&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Number of operations skipped: 5663&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Current seconds left in Life: Forever&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Operational state of entry: Active&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Last time this entry was reset: Never&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Connection loss occurred: FALSE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Timeout occurred: TRUE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Over thresholds occurred: FALSE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Latest RTT (milliseconds): NoConnection/Busy/Timeout&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Latest operation start time: 12:52:33.035 GMT/BST Wed Nov 18 2015&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Latest operation return code: &lt;STRONG&gt;Timeout&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;RTT Values:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;RTTAvg: 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RTTMin: 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RTTMax: 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;NumOfRTT: 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RTTSum: 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RTTSum2: 0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Changing the interface to 'outside' also doesn't work - same result.&lt;/P&gt;
&lt;P&gt;If I run the monitor from my outside interface to the VPN peer addresses in AWS then it works fine but this is routing outside of the tunnel so the tunnel doesn't stay up - the crypto counters don't change.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm at a loss - I can source a ping on my inside interface to the VPC target and that works, so why won't IPSLA from the inside interface also work?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance for any pointers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;JB.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787495#M177478</guid>
      <dc:creator>james.brunner</dc:creator>
      <dc:date>2019-03-12T06:54:37Z</dc:date>
    </item>
    <item>
      <title>The SLA from the ASA doesn't</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787496#M177479</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Try the following:&lt;/P&gt;
&lt;P&gt;group-policy VPN_GrpPolicy attributes&lt;/P&gt;
&lt;P&gt;&amp;nbsp; vpn-idle-timeout none&lt;/P&gt;
&lt;P&gt;tunnel-group 1.2.3.4 type ipsec-l2l&lt;/P&gt;
&lt;P&gt;tunnel-group 1.2.3.4 general-attributes&lt;/P&gt;
&lt;P&gt;&amp;nbsp; default-group-policy VPN_GrpPolicy&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 20:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787496#M177479</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-03-08T20:16:04Z</dc:date>
    </item>
    <item>
      <title>Did you ever figure this out?</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787497#M177480</link>
      <description>&lt;P&gt;I got this working. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have to do two things in AWS as well to make it work. &amp;nbsp;Add a route the outside IP of your ASA under VPN connection (xx.xx.xx.xx/32) and add an inbound rule in the appropriate security group&amp;nbsp;to allow ICMP from the same&amp;nbsp;source IP of your outside ASA IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you do that the ip sla will start working.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 20:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787497#M177480</guid>
      <dc:creator>the-lebowski</dc:creator>
      <dc:date>2016-03-08T20:36:01Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787498#M177481</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have had extensive correspondence with AWS support on this issue - the following is the conclusion of those talks. If you are having the problem, and you are sure that all configuration is set up correctly, then you have likely created your tunnel and/or VGW after 28/10 2015. Amazon rolled out a new set of features at this date, and following that, IP SLA from an ASA no longer works (confirmed by AWS support). For setups created before 28/10 2015, IP SLA from an ASA will work without any issues. This is likely why dpatten78 is reporting that his setup is working. Amazon have offered to manually apply a fix on the setups I manage, that should sort out the problem, and also tells me that they are working on applying this fix globally, meaning that IP SLA would work again on all setups.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have spend a considerable amount of time getting to the above conclusion, so I thought I would share it, to save everyone facing the issue some time.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;\Christian&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2016 09:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787498#M177481</guid>
      <dc:creator>Carsten Madsen</dc:creator>
      <dc:date>2016-03-10T09:27:03Z</dc:date>
    </item>
    <item>
      <title>Hi Carsten,</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787499#M177482</link>
      <description>&lt;P&gt;Hi Carsten,&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;''Amazon have offered to manually apply a fix on the setups I manage, ''&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Could you please let us know what manual fix Amazon has offered. I have configured 2 VPNs with AWS about 2 months before and even though after having the SLA configured still facing intermittent disconnection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Aug 2016 18:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787499#M177482</guid>
      <dc:creator>salman abid</dc:creator>
      <dc:date>2016-08-07T18:04:31Z</dc:date>
    </item>
    <item>
      <title>I have done this and i am</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787500#M177483</link>
      <description>&lt;P&gt;I have done this and i am still unable to ping an instance IP from the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can ping the same instance from a server within the allowed range of IP's in our data center though.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;EDIT:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Adding the last persons comments actually stopped connectivity from the datacenter to aws and vice versa.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Without those lines of config, i can ping from the instance to the ASA outside interface and Datacenter DC.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can also ping from the DC in the datacenter to the instance ip, just not from the ASA, so SLA monitor isn't working!&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2016 03:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-to-aws-and-ipsla-to-keep-tunnel-alive/m-p/2787500#M177483</guid>
      <dc:creator>shankm001</dc:creator>
      <dc:date>2016-11-28T03:40:41Z</dc:date>
    </item>
  </channel>
</rss>

