<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allowing OpenVPN through ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3745940#M8971</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am pretty new to ASA's, and I've been given this task to do. I've set up NAT a few times on ASDM, which seemed quite straightforward: 1) create network objects, 2) config NAT on the internal network object, 3) create an ACL to allow traffic through. I'm still a Cisco noob though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been tasked with allowing access through out 5512X to an OpenVPN server, using UDP port 443. The choice to do this was made above my paygrade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have created the 2 network objects - int_OpenVPN and ext_OpenVPN, and an ACL configured as shown below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When we use the OPenVPN GUI to connect to the internal IP, we connect. When we use the external IP, we get a TLS error - see the log below. Any assistance or pointers much appreciated - I am sure I missed something basic and obvious.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Windows version 6.1 (Windows 7) 64bit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 library versions: OpenSSL 1.1.0h&amp;nbsp; 27 Mar 2018, LZO 2.10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Need hold release from management interface, waiting...&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'state on'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'log all on'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'echo all on'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'bytecount 5'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'hold off'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'hold release'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]&amp;lt;MY EXT IP&amp;gt;:443&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Socket Buffers: R=[8192-&amp;gt;8192] S=[8192-&amp;gt;8192]&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 UDP link local: (not bound)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 UDP link remote: [AF_INET]&amp;lt;MY EXT IP&amp;gt;:443&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: &amp;gt;STATE:1542127953,WAIT,,,,,,&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" color="#FF0000"&gt;Tue Nov 13 11:53:33 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" color="#FF0000"&gt;Tue Nov 13 11:53:33 2018 TLS Error: TLS handshake failed&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:53:33 2018 SIGUSR1[soft,tls-error] received, process restarting&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:53:33 2018 MANAGEMENT: &amp;gt;STATE:1542128013,RECONNECTING,tls-error,,,,,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="ACL" style="width: 614px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/24020iEC4C9A37EF7F16F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="2018-11-13 11_42_00-Terminals 4.0.1 (Files store).png" alt="ACL" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;ACL&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:27:55 GMT</pubDate>
    <dc:creator>edembskey@glenoaks.edu</dc:creator>
    <dc:date>2020-02-21T16:27:55Z</dc:date>
    <item>
      <title>Allowing OpenVPN through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3745940#M8971</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am pretty new to ASA's, and I've been given this task to do. I've set up NAT a few times on ASDM, which seemed quite straightforward: 1) create network objects, 2) config NAT on the internal network object, 3) create an ACL to allow traffic through. I'm still a Cisco noob though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been tasked with allowing access through out 5512X to an OpenVPN server, using UDP port 443. The choice to do this was made above my paygrade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have created the 2 network objects - int_OpenVPN and ext_OpenVPN, and an ACL configured as shown below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When we use the OPenVPN GUI to connect to the internal IP, we connect. When we use the external IP, we get a TLS error - see the log below. Any assistance or pointers much appreciated - I am sure I missed something basic and obvious.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Windows version 6.1 (Windows 7) 64bit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 library versions: OpenSSL 1.1.0h&amp;nbsp; 27 Mar 2018, LZO 2.10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Need hold release from management interface, waiting...&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'state on'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'log all on'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'echo all on'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'bytecount 5'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'hold off'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: CMD 'hold release'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]&amp;lt;MY EXT IP&amp;gt;:443&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 Socket Buffers: R=[8192-&amp;gt;8192] S=[8192-&amp;gt;8192]&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 UDP link local: (not bound)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 UDP link remote: [AF_INET]&amp;lt;MY EXT IP&amp;gt;:443&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:52:33 2018 MANAGEMENT: &amp;gt;STATE:1542127953,WAIT,,,,,,&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" color="#FF0000"&gt;Tue Nov 13 11:53:33 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" color="#FF0000"&gt;Tue Nov 13 11:53:33 2018 TLS Error: TLS handshake failed&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:53:33 2018 SIGUSR1[soft,tls-error] received, process restarting&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Tue Nov 13 11:53:33 2018 MANAGEMENT: &amp;gt;STATE:1542128013,RECONNECTING,tls-error,,,,,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="ACL" style="width: 614px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/24020iEC4C9A37EF7F16F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="2018-11-13 11_42_00-Terminals 4.0.1 (Files store).png" alt="ACL" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;ACL&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:27:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3745940#M8971</guid>
      <dc:creator>edembskey@glenoaks.edu</dc:creator>
      <dc:date>2020-02-21T16:27:55Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing OpenVPN through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3746002#M8972</link>
      <description>Hi,&lt;BR /&gt;What NAT configuration do you have in place? Can you provide the output of the running config?&lt;BR /&gt;Can you also run packet-tracer and provide the output.&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Nov 2018 18:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3746002#M8972</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-13T18:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing OpenVPN through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3746027#M8974</link>
      <description>&lt;P&gt;The only way I know how to run packet tracer is on ASDM - here is what I see at the end.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this the part of running-config you need to see? (I have changed from udp/443 to ip to test if that was the issue).&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;FONT size="2"&gt;nat (inside,merit) source static any any destination static ext_OpenVPN ext_OpenVPN net-to-net no-proxy-arp route-lookup&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;FONT size="2"&gt;access-list merit_access_in extended permit ip any object int_OpenVPN log debugging &lt;/FONT&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;FONT size="2"&gt;object network int_OpenVPN&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&amp;nbsp;nat (inside,merit) static ext_OpenVPN net-to-net&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2018-11-13 13_35_34-Terminals 4.0.1 (Files store).png" style="width: 757px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/24043i2FCD5DC008460067/image-size/large?v=v2&amp;amp;px=999" role="button" title="2018-11-13 13_35_34-Terminals 4.0.1 (Files store).png" alt="2018-11-13 13_35_34-Terminals 4.0.1 (Files store).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 18:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3746027#M8974</guid>
      <dc:creator>edembskey@glenoaks.edu</dc:creator>
      <dc:date>2018-11-13T18:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing OpenVPN through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3746297#M8977</link>
      <description>&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;TCP/443 is open on ACL&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;(On ACL screenshot it shows only UDP/443/ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;As per your NAT command you had configured identity NAT, that is Both Real Host and Mapped Host as same (ext_OpenVPN). It should be the case. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p3"&gt;&lt;SPAN class="s1"&gt;nat (inside,merit) source static any any destination static ext_OpenVPN ext_OpenVPN net-to-net no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p3"&gt;&lt;SPAN class="s1"&gt;If your Int_OpenVPN is behind inside network, you need below NAT Command &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p3"&gt;&lt;SPAN class="s1"&gt;nat (inside, merit) static int_OpenVPN ext_OpenVPN &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p3"&gt;&lt;SPAN class="s1"&gt;Also before testing VPN, I would recommend to open all port on ACL and do ping test before testing VPN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p3"&gt;&lt;SPAN class="s1"&gt;Please share current asa config&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 06:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3746297#M8977</guid>
      <dc:creator>k.nandakumar</dc:creator>
      <dc:date>2018-11-14T06:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing OpenVPN through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3746698#M8979</link>
      <description>&lt;P&gt;Thanks for your help - my manager became impatient and asked someone else to solve the problem.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 16:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-openvpn-through-asa/m-p/3746698#M8979</guid>
      <dc:creator>edembskey@glenoaks.edu</dc:creator>
      <dc:date>2018-11-14T16:33:38Z</dc:date>
    </item>
  </channel>
</rss>

