<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 2130 S2S IPsec trouble in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954658#M925230</link>
    <description>did you debug and check...???&lt;BR /&gt;go to FTD cli and enter system support diagnostic-cli, then debug cryptomap and check y this is failing.</description>
    <pubDate>Thu, 07 Nov 2019 10:45:11 GMT</pubDate>
    <dc:creator>Abheesh Kumar</dc:creator>
    <dc:date>2019-11-07T10:45:11Z</dc:date>
    <item>
      <title>Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954600#M925224</link>
      <description>&lt;P&gt;Hello everyone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been working with Cisco ASA's for several years. Im very used to the &amp;lt;crypto maps&amp;gt; setup for IKE1 and IKE2 tunnels on the old ASA code. Now Im working with a 2130 with version 6.5 againt ASA's with 8.4 code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My problem now is that I have a lot of (cisco asa ipsec removing peer from correlator table failed no match) and Lost Service error messages. This is usually from wrong definition of subnets on each side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When setting up the ASA's I use the old method like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5505-ipsec-error.JPG" style="width: 501px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/48795iE4E06C9A19EEBA71/image-size/large?v=v2&amp;amp;px=999" role="button" title="5505-ipsec-error.JPG" alt="5505-ipsec-error.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;On the 2130 it goes like this for site A and B:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2130-ipsec-error1.JPG" style="width: 349px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/48798i4FF4FB8C8687BCB1/image-size/large?v=v2&amp;amp;px=999" role="button" title="2130-ipsec-error1.JPG" alt="2130-ipsec-error1.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2130-ipsec-error2.JPG" style="width: 331px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/48799iAF3DF8BC2F59E673/image-size/large?v=v2&amp;amp;px=999" role="button" title="2130-ipsec-error2.JPG" alt="2130-ipsec-error2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To me it seems like the definitons is somewhat wrong when using this method on the 2130. You match everything against eachother. Not subnet to subnet like the old ASA code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone help med understand what is wrong ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954600#M925224</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2020-02-21T17:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954634#M925226</link>
      <description>&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;Its simple, you need to add your subnet as NODE A and choose your firewall as device &amp;amp; the other end subnet as NODE B and choose EXTRANET and specify the pubic IP of other end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets take example:&lt;/P&gt;&lt;P&gt;Your Organisation subnet : 192.168.10.0/24, 192.168.20.0//24&lt;/P&gt;&lt;P&gt;create a object group with these two subnets and add this to NODE A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other End Subnet: 10.10.10.0/24, 10.10.20.0/24&lt;/P&gt;&lt;P&gt;reate a object group with these two subnets and add this to NODE B&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then create the IKEv1 or IKEv2 polices and apply, Then create a identity nat rule for the above subnet and allow that traffic in ACP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope This Helps&lt;/P&gt;&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 09:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954634#M925226</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-11-07T09:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954639#M925227</link>
      <description>&lt;P&gt;If you look at the original post, you can se that this has been done. My problem is errors and that the tunnel in some cases only can be brought up from one side.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have a lot of subnets thrown togheter on the 2130 and you have a strict crypto map on the other side, my assumption is that problems like this can arise. Im looking into using an extended access list now. Testing with a 5506X in my office.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would be gratefull if anyone can confirm my assumption.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 09:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954639#M925227</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2019-11-07T09:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954642#M925228</link>
      <description>I have done this with subnets without any issues, Did you allow that in ACP.</description>
      <pubDate>Thu, 07 Nov 2019 10:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954642#M925228</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-11-07T10:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954652#M925229</link>
      <description>&lt;P&gt;Yes, NAT and ACL are all in order.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 10:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954652#M925229</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2019-11-07T10:34:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954658#M925230</link>
      <description>did you debug and check...???&lt;BR /&gt;go to FTD cli and enter system support diagnostic-cli, then debug cryptomap and check y this is failing.</description>
      <pubDate>Thu, 07 Nov 2019 10:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954658#M925230</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-11-07T10:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954673#M925231</link>
      <description>&lt;P&gt;Seems like there are larger problems with my 2130.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ipsecs with only one subnet to other fw like checkpoint are also failing. They suddenly stalls and I have to run "clear crypto ipsec sa peer "xxxx"" to get it working again.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 11:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954673#M925231</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2019-11-07T11:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954683#M925232</link>
      <description>&lt;P&gt;Please check hit count in by entering show access list command&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will get access list information from show running configuration | in cypto&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check what access list showing in this vpn and check that access list by show access list ( acl name) and you will see hit count if there is no hitcount please re add it .&lt;/P&gt;&lt;P&gt;2. Second option is to create extended ACL and set source destination subnet sentence as per your requirement&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it is compulsory that all subnet added here which should be entered in peer end device also with same CIDR&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please check and let us know .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Harmesh Yadav&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 11:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954683#M925232</guid>
      <dc:creator>harmesh88</dc:creator>
      <dc:date>2019-11-07T11:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 2130 S2S IPsec trouble</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954728#M925233</link>
      <description>&lt;P&gt;Thanks for answers. I have now opened a TAC case since these errors seems to be beyond misconfiguration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ACL, NAT, cryptos and encryption (pfs) have been checked out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When trying to get the SA up from remote site, it comes up with "drop" on VPN (removing peer from correlator table failed, no match!) when doing the same from the 2130, the tunnel comes up with now errors on the remote site log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All traffic passes as expected when the SA's are up. But when "idle timeout" or "Lost Service" show up, the problems restarting the SA's continues.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 13:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2130-s2s-ipsec-trouble/m-p/3954728#M925233</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2019-11-07T13:09:16Z</dc:date>
    </item>
  </channel>
</rss>

