cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1867
Views
0
Helpful
8
Replies

Cisco 2130 S2S IPsec trouble

Hello everyone

 

I have been working with Cisco ASA's for several years. Im very used to the <crypto maps> setup for IKE1 and IKE2 tunnels on the old ASA code. Now Im working with a 2130 with version 6.5 againt ASA's with 8.4 code.

 

My problem now is that I have a lot of (cisco asa ipsec removing peer from correlator table failed no match) and Lost Service error messages. This is usually from wrong definition of subnets on each side.

 

When setting up the ASA's I use the old method like this:

5505-ipsec-error.JPG

On the 2130 it goes like this for site A and B:

 

2130-ipsec-error1.JPG2130-ipsec-error2.JPG

 

To me it seems like the definitons is somewhat wrong when using this method on the 2130. You match everything against eachother. Not subnet to subnet like the old ASA code.

 

Can anyone help med understand what is wrong ?

 

 

Please rate as helpful, if that would be the case. Thanx
8 Replies 8

Abheesh Kumar
VIP Alumni
VIP Alumni

Hi Jon,

Its simple, you need to add your subnet as NODE A and choose your firewall as device & the other end subnet as NODE B and choose EXTRANET and specify the pubic IP of other end

 

Lets take example:

Your Organisation subnet : 192.168.10.0/24, 192.168.20.0//24

create a object group with these two subnets and add this to NODE A

 

Other End Subnet: 10.10.10.0/24, 10.10.20.0/24

reate a object group with these two subnets and add this to NODE B

 

Then create the IKEv1 or IKEv2 polices and apply, Then create a identity nat rule for the above subnet and allow that traffic in ACP.

 

Hope This Helps

Abheesh

If you look at the original post, you can se that this has been done. My problem is errors and that the tunnel in some cases only can be brought up from one side. 

 

If you have a lot of subnets thrown togheter on the 2130 and you have a strict crypto map on the other side, my assumption is that problems like this can arise. Im looking into using an extended access list now. Testing with a 5506X in my office.

 

I would be gratefull if anyone can confirm my assumption.

Please rate as helpful, if that would be the case. Thanx

I have done this with subnets without any issues, Did you allow that in ACP.

Yes, NAT and ACL are all in order.

Please rate as helpful, if that would be the case. Thanx

did you debug and check...???
go to FTD cli and enter system support diagnostic-cli, then debug cryptomap and check y this is failing.

Seems like there are larger problems with my 2130. 

 

Ipsecs with only one subnet to other fw like checkpoint are also failing. They suddenly stalls and I have to run "clear crypto ipsec sa peer "xxxx"" to get it working again.

Please rate as helpful, if that would be the case. Thanx

harmesh88
Level 1
Level 1

Please check hit count in by entering show access list command 

 

You will get access list information from show running configuration | in cypto 

 

Check what access list showing in this vpn and check that access list by show access list ( acl name) and you will see hit count if there is no hitcount please re add it .

2. Second option is to create extended ACL and set source destination subnet sentence as per your requirement 

 

it is compulsory that all subnet added here which should be entered in peer end device also with same CIDR 

 

Please check and let us know .

 

Regards,

Harmesh Yadav

 

 

Thanks for answers. I have now opened a TAC case since these errors seems to be beyond misconfiguration. 

 

ACL, NAT, cryptos and encryption (pfs) have been checked out.

 

When trying to get the SA up from remote site, it comes up with "drop" on VPN (removing peer from correlator table failed, no match!) when doing the same from the 2130, the tunnel comes up with now errors on the remote site log.

 

All traffic passes as expected when the SA's are up. But when "idle timeout" or "Lost Service" show up, the problems restarting the SA's continues.

Please rate as helpful, if that would be the case. Thanx
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card