05-30-2007 04:13 PM - edited 02-21-2020 01:32 AM
I think I lost my mind over this.
I have 2 ASA, one at a remote site- ASA5505 and one at our datacenter-ASA5520. The remote site has 2
internet connections, primary is T1 and backup is DSL. All I want to do is this: when the the T1 fails
the VPN tunnel between the Remote ASA and Datacenter ASA to move the tunnel to the DSL link.
What I thought I had to was on the Datacenter, create 2 tunnel groups and 2 new policies for the remote office
well nope its not working. I have a TAC case open for 6 weeks and even they dont know! arrrr! sorry now thats out.
Remote Site on DSL(2.2.2.2) -------------Datacenter (3.3.3.3) Cry Map Policy 170 -> ACL outside_cyptomap_170 -> peer 2.2.2.2 -> Remote Net 192.168.1.0/24arrrr! sorry now thats out.
Remote Site on T1 (1.1.1.1) (3.3.3.3) Cry Map Policy 160- > ACL outside_crytopmap_160 -> peer 1.1.1.1 -> Remote net 192.168.1.0/24
I think its because the network lists overlap, so how do get this to work. I cant be the only one who has config like this, or am I?
-Mike
05-30-2007 05:14 PM
Which end are you attempting to initiate the tunnel from after the T1 goes down? Take a look here under Usage Guidlines, the paragraph which starts with "Configuring multiple peers". You should be able to set multiple peers in the datacenter ASA instead of creating two distinct tunnel-groups. What is taking care of the routing for the failover in remote ASA, are you using the Backup ISP option?
05-30-2007 06:00 PM
Hey thanks!
I want initiate the tunnel from the datacenter, when the T1 goes down. I'm using the backup isp option.
So I just read the link, very good thank you. Still stuck here. When T1 is up tunnel is good, when T1 is down nothing. What I get now is- %PIX|ASA-3-713042: IKE Initiator unable to find policy: Intf in the syslog messages?
Datacener is now:
crypto map vpn 160 match address outside_cryptomap_160
crypto map vpn 160 set connection-type originate-only
crypto map vpn 160 set peer t1peer dslpeer
crypto map vpn 160 set transform-set myset
Remote site:
crypto map outside_map 50 match address outside_50_cryptomap
crypto map outside_map 50 set connection-type answer-only
crypto map outside_map 50 set peer datacenter
crypto map outside_map 50 set transform-set myset
Any help would be nice.
Thanks again!
05-30-2007 06:15 PM
What is the rest of that log? Do you want to post your configs, that may help?
Is isakmp enabled on dsl interface at remote site?
05-30-2007 06:39 PM
05-31-2007 04:54 AM
It doesn't appear the datacenter ASA ever tries the second backup peer of 76.x.x.x like it is supposed to.
05-31-2007 05:49 AM
Make sure that dpd keepalives are configured on all tunnel-groups.
isakmp keepalive
05-31-2007 06:06 AM
I just set that up, ran this on both ends
crypto isakmp disconnect-notify
crypto isakmp keepalive 10 2
05-31-2007 06:19 AM
What is the "disconnect-notify" supposed to do? Have you tried without it?
05-31-2007 06:23 AM
i have tried with and with out.
Cisco says
Remote access or LAN-to-LAN sessions can drop for several reasons, such as: a security appliance shutdown or reboot, session idle timeout, maximum connection time exceeded, or administrator cut-off.
The security appliance can notify qualified peers (in LAN-to-LAN configurations), Cisco VPN Clients and VPN 3002 hardware clients of sessions that are about to be disconnected. The peer or client receiving the alert decodes the reason and displays it in the event log or in a pop-up panel. This feature is disabled by default.
Qualified clients and peers include the following:
?Security appliances with Alerts enabled.
?Cisco VPN clients running version 4.0 or later software (no configuration required).
?VPN 3002 hardware clients running version 4.0 or later software, and with Alerts enabled.
?VPN 3000 Series concentrators running version 4.0 or later software, with Alerts enabled.
To enable disconnect notification to IPSec peers, enter the isakmp disconnect-notify command.
tried it for kicks
05-31-2007 06:32 AM
Ah ok, I was trying to figure out how the peer would be notified that the tunnel was dropping when the connection (T1) would not be there to be able to alert the peer. Also, the peers would know becuase of Dead Peer Detection that the peer was no longer available.
Can TAC explain why the datacenter ASA is not attempting the backup peer?
If you take out the primary peer from the config and just use the backup peer, does this work?(with the t1 unplugged of course)
05-31-2007 07:11 AM
Tac has no idea :(
"
If you take out the primary peer from the config and just use the backup peer, does this work?(with the t1 unplugged of course)" I will have to try this.
10-12-2007 01:53 AM
Hi guys, do you have find any solutions ?
I have look at your config, doesn't it miss some static to allow outbound connection ?
10-12-2007 04:29 AM
I'm still working with cisco on this. They say 8.0.2 Code will fix this. But its has not worked for me.
Here is the bug.
http://www.cisco.com/cgi-bin/Support/Bugtool/onebug.pl?bugid=CSCsh44239&Submit=Search
07-16-2008 08:56 PM
Hi Mike,
I am doing the similar thing now. Have you get your problem resolved?
Best regards,
Heng
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide