cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4471
Views
0
Helpful
24
Replies

Cisco ASA VPN Setup for Avaya Phone

dsm600rr
Level 1
Level 1

Hello all,

 

Bear with me, as I am VERY new to Firewalls, just messing around with a old ASA5520 in my lab.

 

I am trying to set up the firewall so my Avaya IP Phone can VPN Back to it.

 

Here is where its getting stuck:

2021-09-27_14-20-51.png

 

The only Phase 2 settings I can input in my phone are:
 - IPsec PFS DH Group: Set to No PFS
 - IPsec Encryption Alg: Set to AES-128
 - IPsec Auth. Alg.: Set to SHA-1

2021-09-27_14-31-14.png

 

Phone is showing "IKE Phase 2 no response"

Suggestions?

 

24 Replies 24

My Phones always already have the group name as "VPNPHONE" by default in the programming, unless I am miss-understanding what you mean.

 

I get an error when running the command:

2021-09-30_7-35-33.png

Hello,

 

the group name should be fine then, just make sure they match.

 

To get rid of NAT-T, try:

 

no crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set nat-t-disable

 

That should enable NAT-T...

2021-09-30_8-36-55.png

Hello,

 

Enabling this option got the tunnel to work and get passed phase 1 and phase 2:

2021-10-01_13-13-58.png

 

2021-10-01_13-18-02.png

 

Next issue is the phone is now showing "Discover", its not finding the Phone System. I have the PBX, HTTP and HTTPS's servers set in the phone to the PBX.

 

Is there something in the ASA that needs to point the phone to the PBX?

Hello all,

 

I just wait to say thank you for all the help, I got everything working. I am also quite impressed with myself, being this is the first Firewall I have ever touched and it did not take too long.

 

Have a great weekend everyone!

 

2021-10-01_14-59-24.png

Hello,

 

so everything is working now ? Can you post the final ASA configuration, for reference ?

: Saved
: 
: Serial Number: JMX1002K04V
: Hardware:   ASA5520, 2048 MB RAM, CPU Pentium 4 Celeron 2000 MHz
:
ASA Version 9.1(7)4 
!
hostname dsm-asa
domain-name www.123.com
enable password wdTpp2T9PTYfBG49 encrypted
names
ip local pool Avaya_VPN_Phones 10.10.20.5-10.10.20.15 mask 255.255.255.0
!
interface GigabitEthernet0/0
 nameif outside
 security-level 0
 ip address xxx.xxx.xxx.213 255.255.255.248 
!
interface GigabitEthernet0/1
 nameif inside
 security-level 100
 ip address 10.10.10.1 255.255.255.0 
!
interface GigabitEthernet0/2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 management-only
 nameif mgmt
 security-level 100
 ip address 10.10.15.50 255.255.255.0 
!
banner login Unauthorized access makes Darrell :(
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup outside
dns server-group DefaultDNS
 name-server 208.67.222.222
 domain-name www.123.com
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network Internat
 subnet 10.10.10.0 255.255.255.0
 description Access to Internet
object network 10.10.10.5
 host 10.10.10.5
object network obj_10.10.10.0
 subnet 10.10.10.0 255.255.255.0
object network obj_10.10.10.5
 host 10.10.10.5
object network obj_any
 subnet 0.0.0.0 0.0.0.0
object network obj_VPNPool
 subnet 10.10.20.0 255.255.255.0
object-group service Avaya-Softphone-Client_Ports tcp-udp
 port-object range 40750 50750
 port-object eq 411
 port-object eq 443
 port-object range sip 5061
 port-object range 5064 5065
 port-object eq 8411
 port-object eq www
object-group protocol TCPUDP
 protocol-object udp
 protocol-object tcp
access-list OUTSIDE-IN extended permit icmp any any 
access-list OUTSIDE_IN extended permit icmp any any echo-reply 
access-list OUTSIDE_IN extended permit icmp any4 any 
access-list OUTSIDE_IN extended permit tcp any object 10.10.10.5 object-group Avaya-Softphone-Client_Ports 
access-list OUTSIDE_IN extended permit udp any object 10.10.10.5 object-group Avaya-Softphone-Client_Ports 
access-list inside_access_in extended permit ip any any 
access-list inside_access_in extended permit icmp any4 any 
access-list Inside_Avaya_Network/24 standard permit 10.10.10.0 255.255.255.0 
pager lines 24
logging enable
logging trap informational
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu mgmt 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static obj_10.10.10.0 obj_10.10.10.0 destination static obj_VPNPool obj_VPNPool no-proxy-arp route-lookup
!
object network Internat
 nat (any,outside) dynamic interface
object network obj_any
 nat (any,outside) dynamic interface
access-group OUTSIDE_IN in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.214 1 
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL 
aaa authentication http console LOCAL 
aaa authentication telnet console LOCAL 
http server enable
http 10.10.15.0 255.255.255.0 mgmt
http 10.10.10.0 255.255.255.0 inside
http xxx.xxx.xxx.0 255.255.255.0 outside
no snmp-server location
no snmp-server contact
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec ikev1 transform-set AES128-SHA esp-aes esp-sha-hmac 
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 20 set ikev1 transform-set AES128-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca trustpool policy
crypto ikev1 enable outside
crypto ikev1 policy 5
 authentication pre-share
 encryption 3des
 hash md5
 group 2
 lifetime 86400
telnet timeout 5
ssh stricthostkeycheck
ssh xxx.xxx.xxx.0 255.255.255.0 outside
ssh 10.10.10.0 255.255.255.0 inside
ssh 10.10.15.0 255.255.255.0 mgmt
ssh timeout 60
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcpd dns 8.8.8.8 8.8.4.4
dhcpd domain 123.com
dhcpd option 3 ip 10.10.10.1
!
dhcpd address 10.10.10.100-10.10.10.150 inside
!
dhcpd address 10.10.15.100-10.10.15.105 mgmt
dhcpd enable mgmt
!
threat-detection basic-threat
threat-detection statistics host
threat-detection statistics port
threat-detection statistics protocol
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl encryption aes128-sha1 aes256-sha1 3des-sha1 rc4-sha1 dhe-aes128-sha1 dhe-aes256-sha1
group-policy VPNPHONE internal
group-policy VPNPHONE attributes
 dns-server value 4.2.2.2
 vpn-tunnel-protocol ikev1 
 split-tunnel-policy tunnelall
 default-domain value www.123.com
 split-tunnel-all-dns disable
 secure-unit-authentication disable
username vpnphone4 password xRoxWaRq28O7oRty encrypted
username vpnphone5 password xRoxWaRq28O7oRty encrypted
username vpnphone2 password xRoxWaRq28O7oRty encrypted
username vpnphone3 password xRoxWaRq28O7oRty encrypted
username vpnphone1 password xRoxWaRq28O7oRty encrypted
username cisco password QoZZ4p8qBUKyWxpF encrypted
tunnel-group VPNPHONE type remote-access
tunnel-group VPNPHONE general-attributes
 address-pool Avaya_VPN_Phones
 default-group-policy VPNPHONE
tunnel-group VPNPHONE ipsec-attributes
 ikev1 pre-shared-key *****
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
 class class-default
  user-statistics accounting
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
Cryptochecksum:a6df0b54f784fb3ba3998f8f2ea5542c
: end
no asdm history enable

I ended up needing to add an IP Route (in the PBX) from the PBX Subnet 10.10.10.0 to the VPN DHCP Subnet: 10.10.20.0

Hello,

 

thanks...very useful information for future reference.

dsm600rr
Level 1
Level 1

I just wanted to add, including this line in the ASA allowed me to remove the IP Route in the PBX routing from the VPN DHCP Server Pool (10.10.20.0/24) to the PBX (10.10.10.0/24)

access-list nonat extended permit ip 10.10.10.0 255.255.255.0 10.10.20.0 255.255.255.0

Review Cisco Networking for a $25 gift card