09-27-2021 11:34 AM - edited 09-27-2021 01:08 PM
Hello all,
Bear with me, as I am VERY new to Firewalls, just messing around with a old ASA5520 in my lab.
I am trying to set up the firewall so my Avaya IP Phone can VPN Back to it.
Here is where its getting stuck:
The only Phase 2 settings I can input in my phone are:
- IPsec PFS DH Group: Set to No PFS
- IPsec Encryption Alg: Set to AES-128
- IPsec Auth. Alg.: Set to SHA-1
Phone is showing "IKE Phase 2 no response"
Suggestions?
09-30-2021 04:32 AM - edited 09-30-2021 04:44 AM
My Phones always already have the group name as "VPNPHONE" by default in the programming, unless I am miss-understanding what you mean.
I get an error when running the command:
09-30-2021 05:10 AM
Hello,
the group name should be fine then, just make sure they match.
To get rid of NAT-T, try:
no crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set nat-t-disable
That should enable NAT-T...
09-30-2021 05:37 AM
10-01-2021 10:21 AM
Hello,
Enabling this option got the tunnel to work and get passed phase 1 and phase 2:
Next issue is the phone is now showing "Discover", its not finding the Phone System. I have the PBX, HTTP and HTTPS's servers set in the phone to the PBX.
Is there something in the ASA that needs to point the phone to the PBX?
10-01-2021 12:00 PM
Hello all,
I just wait to say thank you for all the help, I got everything working. I am also quite impressed with myself, being this is the first Firewall I have ever touched and it did not take too long.
Have a great weekend everyone!
10-01-2021 12:21 PM
Hello,
so everything is working now ? Can you post the final ASA configuration, for reference ?
10-01-2021 12:36 PM
: Saved : : Serial Number: JMX1002K04V : Hardware: ASA5520, 2048 MB RAM, CPU Pentium 4 Celeron 2000 MHz : ASA Version 9.1(7)4 ! hostname dsm-asa domain-name www.123.com enable password wdTpp2T9PTYfBG49 encrypted names ip local pool Avaya_VPN_Phones 10.10.20.5-10.10.20.15 mask 255.255.255.0 ! interface GigabitEthernet0/0 nameif outside security-level 0 ip address xxx.xxx.xxx.213 255.255.255.248 ! interface GigabitEthernet0/1 nameif inside security-level 100 ip address 10.10.10.1 255.255.255.0 ! interface GigabitEthernet0/2 shutdown no nameif no security-level no ip address ! interface GigabitEthernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 management-only nameif mgmt security-level 100 ip address 10.10.15.50 255.255.255.0 ! banner login Unauthorized access makes Darrell :( ftp mode passive clock timezone EST -5 clock summer-time EDT recurring dns domain-lookup outside dns server-group DefaultDNS name-server 208.67.222.222 domain-name www.123.com same-security-traffic permit inter-interface same-security-traffic permit intra-interface object network Internat subnet 10.10.10.0 255.255.255.0 description Access to Internet object network 10.10.10.5 host 10.10.10.5 object network obj_10.10.10.0 subnet 10.10.10.0 255.255.255.0 object network obj_10.10.10.5 host 10.10.10.5 object network obj_any subnet 0.0.0.0 0.0.0.0 object network obj_VPNPool subnet 10.10.20.0 255.255.255.0 object-group service Avaya-Softphone-Client_Ports tcp-udp port-object range 40750 50750 port-object eq 411 port-object eq 443 port-object range sip 5061 port-object range 5064 5065 port-object eq 8411 port-object eq www object-group protocol TCPUDP protocol-object udp protocol-object tcp access-list OUTSIDE-IN extended permit icmp any any access-list OUTSIDE_IN extended permit icmp any any echo-reply access-list OUTSIDE_IN extended permit icmp any4 any access-list OUTSIDE_IN extended permit tcp any object 10.10.10.5 object-group Avaya-Softphone-Client_Ports access-list OUTSIDE_IN extended permit udp any object 10.10.10.5 object-group Avaya-Softphone-Client_Ports access-list inside_access_in extended permit ip any any access-list inside_access_in extended permit icmp any4 any access-list Inside_Avaya_Network/24 standard permit 10.10.10.0 255.255.255.0 pager lines 24 logging enable logging trap informational logging asdm informational mtu outside 1500 mtu inside 1500 mtu mgmt 1500 no failover icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 no arp permit-nonconnected nat (inside,outside) source static obj_10.10.10.0 obj_10.10.10.0 destination static obj_VPNPool obj_VPNPool no-proxy-arp route-lookup ! object network Internat nat (any,outside) dynamic interface object network obj_any nat (any,outside) dynamic interface access-group OUTSIDE_IN in interface outside access-group inside_access_in in interface inside route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.214 1 timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy user-identity default-domain LOCAL aaa authentication ssh console LOCAL aaa authentication http console LOCAL aaa authentication telnet console LOCAL http server enable http 10.10.15.0 255.255.255.0 mgmt http 10.10.10.0 255.255.255.0 inside http xxx.xxx.xxx.0 255.255.255.0 outside no snmp-server location no snmp-server contact crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec ikev1 transform-set AES128-SHA esp-aes esp-sha-hmac crypto ipsec security-association pmtu-aging infinite crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 20 set ikev1 transform-set AES128-SHA crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP crypto map outside_map interface outside crypto ca trustpool policy crypto ikev1 enable outside crypto ikev1 policy 5 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400 telnet timeout 5 ssh stricthostkeycheck ssh xxx.xxx.xxx.0 255.255.255.0 outside ssh 10.10.10.0 255.255.255.0 inside ssh 10.10.15.0 255.255.255.0 mgmt ssh timeout 60 ssh version 2 ssh key-exchange group dh-group1-sha1 console timeout 0 dhcpd dns 8.8.8.8 8.8.4.4 dhcpd domain 123.com dhcpd option 3 ip 10.10.10.1 ! dhcpd address 10.10.10.100-10.10.10.150 inside ! dhcpd address 10.10.15.100-10.10.15.105 mgmt dhcpd enable mgmt ! threat-detection basic-threat threat-detection statistics host threat-detection statistics port threat-detection statistics protocol threat-detection statistics access-list no threat-detection statistics tcp-intercept ssl encryption aes128-sha1 aes256-sha1 3des-sha1 rc4-sha1 dhe-aes128-sha1 dhe-aes256-sha1 group-policy VPNPHONE internal group-policy VPNPHONE attributes dns-server value 4.2.2.2 vpn-tunnel-protocol ikev1 split-tunnel-policy tunnelall default-domain value www.123.com split-tunnel-all-dns disable secure-unit-authentication disable username vpnphone4 password xRoxWaRq28O7oRty encrypted username vpnphone5 password xRoxWaRq28O7oRty encrypted username vpnphone2 password xRoxWaRq28O7oRty encrypted username vpnphone3 password xRoxWaRq28O7oRty encrypted username vpnphone1 password xRoxWaRq28O7oRty encrypted username cisco password QoZZ4p8qBUKyWxpF encrypted tunnel-group VPNPHONE type remote-access tunnel-group VPNPHONE general-attributes address-pool Avaya_VPN_Phones default-group-policy VPNPHONE tunnel-group VPNPHONE ipsec-attributes ikev1 pre-shared-key ***** ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options class class-default user-statistics accounting ! service-policy global_policy global prompt hostname context no call-home reporting anonymous Cryptochecksum:a6df0b54f784fb3ba3998f8f2ea5542c : end no asdm history enable
10-01-2021 12:40 PM
I ended up needing to add an IP Route (in the PBX) from the PBX Subnet 10.10.10.0 to the VPN DHCP Subnet: 10.10.20.0
10-02-2021 05:48 AM
Hello,
thanks...very useful information for future reference.
10-04-2021 06:39 AM
I just wanted to add, including this line in the ASA allowed me to remove the IP Route in the PBX routing from the VPN DHCP Server Pool (10.10.20.0/24) to the PBX (10.10.10.0/24)
access-list nonat extended permit ip 10.10.10.0 255.255.255.0 10.10.20.0 255.255.255.0
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide